Vulnerability Details CVE-2022-32223
Node.js is vulnerable to Hijack Execution Flow: DLL Hijacking under certain conditions on Windows platforms.This vulnerability can be exploited if the victim has the following dependencies on a Windows machine:* OpenSSL has been installed and “C:\Program Files\Common Files\SSL\openssl.cnf” exists.Whenever the above conditions are present, `node.exe` will search for `providers.dll` in the current user directory.After that, `node.exe` will try to search for `providers.dll` by the DLL Search Order in Windows.It is possible for an attacker to place the malicious file `providers.dll` under a variety of paths and exploit this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.091
EPSS Ranking 92.3%
CVSS Severity
CVSS v3 Score 7.3
Products affected by CVE-2022-32223
-
cpe:2.3:a:nodejs:node.js:14.0.0
-
cpe:2.3:a:nodejs:node.js:14.1.0
-
cpe:2.3:a:nodejs:node.js:14.10.0
-
cpe:2.3:a:nodejs:node.js:14.10.1
-
cpe:2.3:a:nodejs:node.js:14.11.0
-
cpe:2.3:a:nodejs:node.js:14.12.0
-
cpe:2.3:a:nodejs:node.js:14.13.0
-
cpe:2.3:a:nodejs:node.js:14.13.1
-
cpe:2.3:a:nodejs:node.js:14.14.0
-
cpe:2.3:a:nodejs:node.js:14.15.0
-
cpe:2.3:a:nodejs:node.js:14.15.1
-
cpe:2.3:a:nodejs:node.js:14.15.2
-
cpe:2.3:a:nodejs:node.js:14.15.3
-
cpe:2.3:a:nodejs:node.js:14.15.4
-
cpe:2.3:a:nodejs:node.js:14.15.5
-
cpe:2.3:a:nodejs:node.js:14.16.0
-
cpe:2.3:a:nodejs:node.js:14.16.1
-
cpe:2.3:a:nodejs:node.js:14.17.0
-
cpe:2.3:a:nodejs:node.js:14.17.1
-
cpe:2.3:a:nodejs:node.js:14.17.2
-
cpe:2.3:a:nodejs:node.js:14.17.3
-
cpe:2.3:a:nodejs:node.js:14.17.4
-
cpe:2.3:a:nodejs:node.js:14.17.5
-
cpe:2.3:a:nodejs:node.js:14.17.6
-
cpe:2.3:a:nodejs:node.js:14.18.0
-
cpe:2.3:a:nodejs:node.js:14.18.1
-
cpe:2.3:a:nodejs:node.js:14.18.2
-
cpe:2.3:a:nodejs:node.js:14.18.3
-
cpe:2.3:a:nodejs:node.js:14.19.0
-
cpe:2.3:a:nodejs:node.js:14.19.1
-
cpe:2.3:a:nodejs:node.js:14.19.2
-
cpe:2.3:a:nodejs:node.js:14.19.3
-
cpe:2.3:a:nodejs:node.js:14.2.0
-
cpe:2.3:a:nodejs:node.js:14.3.0
-
cpe:2.3:a:nodejs:node.js:14.4.0
-
cpe:2.3:a:nodejs:node.js:14.5.0
-
cpe:2.3:a:nodejs:node.js:14.6.0
-
cpe:2.3:a:nodejs:node.js:14.7.0
-
cpe:2.3:a:nodejs:node.js:14.8.0
-
cpe:2.3:a:nodejs:node.js:14.9.0
-
cpe:2.3:a:nodejs:node.js:16.0.0
-
cpe:2.3:a:nodejs:node.js:16.1.0
-
cpe:2.3:a:nodejs:node.js:16.10.0
-
cpe:2.3:a:nodejs:node.js:16.11.0
-
cpe:2.3:a:nodejs:node.js:16.11.1
-
cpe:2.3:a:nodejs:node.js:16.12.0
-
cpe:2.3:a:nodejs:node.js:16.13.0
-
cpe:2.3:a:nodejs:node.js:16.13.1
-
cpe:2.3:a:nodejs:node.js:16.13.2
-
cpe:2.3:a:nodejs:node.js:16.14.0
-
cpe:2.3:a:nodejs:node.js:16.14.1
-
cpe:2.3:a:nodejs:node.js:16.14.2
-
cpe:2.3:a:nodejs:node.js:16.15.0
-
cpe:2.3:a:nodejs:node.js:16.15.1
-
cpe:2.3:a:nodejs:node.js:16.2.0
-
cpe:2.3:a:nodejs:node.js:16.3.0
-
cpe:2.3:a:nodejs:node.js:16.4.0
-
cpe:2.3:a:nodejs:node.js:16.4.1
-
cpe:2.3:a:nodejs:node.js:16.4.2
-
cpe:2.3:a:nodejs:node.js:16.5.0
-
cpe:2.3:a:nodejs:node.js:16.6.0
-
cpe:2.3:a:nodejs:node.js:16.6.1
-
cpe:2.3:a:nodejs:node.js:16.6.2
-
cpe:2.3:a:nodejs:node.js:16.7.0
-
cpe:2.3:a:nodejs:node.js:16.8.0
-
cpe:2.3:a:nodejs:node.js:16.9.0
-
cpe:2.3:a:nodejs:node.js:16.9.1
-
cpe:2.3:a:nodejs:node.js:18.0.0
-
cpe:2.3:a:nodejs:node.js:18.0.1
-
cpe:2.3:a:nodejs:node.js:18.0.2
-
cpe:2.3:a:nodejs:node.js:18.0.3
-
cpe:2.3:a:nodejs:node.js:18.0.4
-
cpe:2.3:o:microsoft:windows:-