Vulnerability testing and research are vital tasks in the cybersecurity community to keep software developments protected against the latest security threats. Recently, some updates were released for Node.js, which focus on fixing a critical vulnerability as well as two other high severity flaws.
It should be remembered that Node.js, created by Ryan Dahl, is a cross-platform, open-source runtime environment for the server layer based on the asynchronous ECMAScript programming language, with data I/O in an event-oriented architecture based on Google V8 engine.
The reported flaws, with their respective CVSS trackers, are:
- CVE-2019-15606: HTTP header values do not have final OWS trimmed. HTTP header values can have OWS at the end, but must be deleted. It is not semantically part of the header value, and if treated as part of the value, it can cause spurious inequality between expected and actual header values
- CVE-2019-15605: Smuggling HTTP requests using an incorrectly formatted transfer encoding header
- CVE-2019-15604: Remote activation of an assertion on a TLS server with an incorrectly formatted certificate string. Node.js is vulnerable to a TLS issue that could remotely trigger an assertion on a TLS server with an incorrectly formatted certificate string
According to the announcement of the developers, the main update concerns HTTP analysis, which has strengthened their security measures: “Although this may cause interoperability issues with some unsupported implementations, it is possible to disable updated checks with the line flag –insecure-http-parser command; the use of an insecure HTTP parser should also be avoided.”
Vulnerability testing indicates that all supported Nodes.js versions 10.x, 12.x, and 13.x are exposed to exploitation of this flaw. Developers recommend that users install updates as soon as possible to mitigate the risk of exploitation. Updated software development versions are: 10.19.0, 12.15.0 and 13.8.0.
The collaborative work of independent researchers, ethical hackers as well as the implementation of vulnerability testing processes implemented by multiple firms and private organizations, such as the International Institute of Cyber Security (IICS), help companies and widely used tool developers stay ahead of the curve in today’s complex cybersecurity landscape.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.