Description
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default behaviour of the Node-RED runtime. The vulnerability is patched in the 1.2.8 release. A workaround is to ensure only authorized users are able to access the editor url.
Remediation
References
https://github.com/node-red/node-red/releases/tag/1.2.8
https://github.com/node-red/node-red/security/advisories/GHSA-xp9c-82x8-7f67
https://www.npmjs.com/package/%40node-red/editor-api
https://www.npmjs.com/package/%40node-red/runtime
Related Vulnerabilities
CVE-2014-125087 Vulnerability in maven package com.jamesmurty.utils:java-xmlbuilder
CVE-2022-26049 Vulnerability in maven package com.diffplug.gradle:goomph
CVE-2019-10158 Vulnerability in maven package org.infinispan:infinispan-spring5-remote
CVE-2022-29599 Vulnerability in maven package org.apache.maven.shared:maven-shared-utils
CVE-2010-2076 Vulnerability in maven package org.apache.cxf:cxf-bundle-jaxrs