Vulnerability Details CVE-2021-21297
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default behaviour of the Node-RED runtime. The vulnerability is patched in the 1.2.8 release. A workaround is to ensure only authorized users are able to access the editor url.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 55.0%
CVSS Severity
CVSS v3 Score 7.7
CVSS v2 Score 4.0
Products affected by CVE-2021-21297
-
cpe:2.3:a:nodered:node-red:0.10.0
-
cpe:2.3:a:nodered:node-red:0.10.1
-
cpe:2.3:a:nodered:node-red:0.10.10
-
cpe:2.3:a:nodered:node-red:0.10.2
-
cpe:2.3:a:nodered:node-red:0.10.3
-
cpe:2.3:a:nodered:node-red:0.10.4
-
cpe:2.3:a:nodered:node-red:0.10.6
-
cpe:2.3:a:nodered:node-red:0.10.8
-
cpe:2.3:a:nodered:node-red:0.10.9
-
cpe:2.3:a:nodered:node-red:0.11.0
-
cpe:2.3:a:nodered:node-red:0.11.1
-
cpe:2.3:a:nodered:node-red:0.11.2
-
cpe:2.3:a:nodered:node-red:0.12.0
-
cpe:2.3:a:nodered:node-red:0.12.1
-
cpe:2.3:a:nodered:node-red:0.12.2
-
cpe:2.3:a:nodered:node-red:0.12.3
-
cpe:2.3:a:nodered:node-red:0.12.4
-
cpe:2.3:a:nodered:node-red:0.12.5
-
cpe:2.3:a:nodered:node-red:0.13.0
-
cpe:2.3:a:nodered:node-red:0.13.1
-
cpe:2.3:a:nodered:node-red:0.13.2
-
cpe:2.3:a:nodered:node-red:0.13.3
-
cpe:2.3:a:nodered:node-red:0.13.4
-
cpe:2.3:a:nodered:node-red:0.14.0
-
cpe:2.3:a:nodered:node-red:0.14.1
-
cpe:2.3:a:nodered:node-red:0.14.2
-
cpe:2.3:a:nodered:node-red:0.14.3
-
cpe:2.3:a:nodered:node-red:0.14.4
-
cpe:2.3:a:nodered:node-red:0.14.5
-
cpe:2.3:a:nodered:node-red:0.14.6
-
cpe:2.3:a:nodered:node-red:0.15.0
-
cpe:2.3:a:nodered:node-red:0.15.1
-
cpe:2.3:a:nodered:node-red:0.15.2
-
cpe:2.3:a:nodered:node-red:0.15.3
-
cpe:2.3:a:nodered:node-red:0.16.0
-
cpe:2.3:a:nodered:node-red:0.16.1
-
cpe:2.3:a:nodered:node-red:0.16.2
-
cpe:2.3:a:nodered:node-red:0.17.0
-
cpe:2.3:a:nodered:node-red:0.17.1
-
cpe:2.3:a:nodered:node-red:0.17.2
-
cpe:2.3:a:nodered:node-red:0.17.3
-
cpe:2.3:a:nodered:node-red:0.17.4
-
cpe:2.3:a:nodered:node-red:0.17.5
-
cpe:2.3:a:nodered:node-red:0.18.0
-
cpe:2.3:a:nodered:node-red:0.18.1
-
cpe:2.3:a:nodered:node-red:0.18.2
-
cpe:2.3:a:nodered:node-red:0.18.3
-
cpe:2.3:a:nodered:node-red:0.18.4
-
cpe:2.3:a:nodered:node-red:0.18.5
-
cpe:2.3:a:nodered:node-red:0.18.6
-
cpe:2.3:a:nodered:node-red:0.18.7
-
cpe:2.3:a:nodered:node-red:0.19.0
-
cpe:2.3:a:nodered:node-red:0.19.1
-
cpe:2.3:a:nodered:node-red:0.19.2
-
cpe:2.3:a:nodered:node-red:0.19.3
-
cpe:2.3:a:nodered:node-red:0.19.4
-
cpe:2.3:a:nodered:node-red:0.19.5
-
cpe:2.3:a:nodered:node-red:0.19.6
-
cpe:2.3:a:nodered:node-red:0.2.0
-
cpe:2.3:a:nodered:node-red:0.20.0
-
cpe:2.3:a:nodered:node-red:0.20.1
-
cpe:2.3:a:nodered:node-red:0.20.2
-
cpe:2.3:a:nodered:node-red:0.20.3
-
cpe:2.3:a:nodered:node-red:0.20.4
-
cpe:2.3:a:nodered:node-red:0.20.5
-
cpe:2.3:a:nodered:node-red:0.20.6
-
cpe:2.3:a:nodered:node-red:0.20.7
-
cpe:2.3:a:nodered:node-red:0.20.8
-
cpe:2.3:a:nodered:node-red:0.3.0
-
cpe:2.3:a:nodered:node-red:0.4.0
-
cpe:2.3:a:nodered:node-red:0.5.0
-
cpe:2.3:a:nodered:node-red:0.6.0
-
cpe:2.3:a:nodered:node-red:0.7.0
-
cpe:2.3:a:nodered:node-red:0.7.1
-
cpe:2.3:a:nodered:node-red:0.7.2
-
cpe:2.3:a:nodered:node-red:0.8.0
-
cpe:2.3:a:nodered:node-red:0.8.1
-
cpe:2.3:a:nodered:node-red:0.9.0
-
cpe:2.3:a:nodered:node-red:0.9.1
-
cpe:2.3:a:nodered:node-red:1.0.0
-
cpe:2.3:a:nodered:node-red:1.0.1
-
cpe:2.3:a:nodered:node-red:1.0.2
-
cpe:2.3:a:nodered:node-red:1.0.3