Skip to content

Commit 35c6994

Browse files
1 parent ce95b17 commit 35c6994

1 file changed

Lines changed: 15 additions & 3 deletions

File tree

advisories/github-reviewed/2022/05/GHSA-52rh-5rpj-c3w6/GHSA-52rh-5rpj-c3w6.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-52rh-5rpj-c3w6",
4-
"modified": "2022-05-05T16:00:50Z",
4+
"modified": "2026-02-11T21:54:44Z",
55
"published": "2022-05-05T16:00:50Z",
66
"aliases": [],
77
"summary": "Improper handling of multiline messages in node-irc",
88
"details": "node-irc is a socket wrapper for the IRC protocol that extends Node.js' EventEmitter. The vulnerability allows an attacker to manipulate a Matrix user into executing IRC commands by having them reply to a maliciously crafted message. Incorrect handling of a CR character allowed for making part of the message be sent to the IRC server verbatim rather than as a message to the channel.\nThe vulnerability has been patched in node-irc version 1.2.1.",
9-
"severity": [],
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
13+
}
14+
],
1015
"affected": [
1116
{
1217
"package": {
@@ -36,6 +41,10 @@
3641
"type": "WEB",
3742
"url": "https://github.com/matrix-org/node-irc/security/advisories/GHSA-52rh-5rpj-c3w6"
3843
},
44+
{
45+
"type": "ADVISORY",
46+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29166"
47+
},
3948
{
4049
"type": "WEB",
4150
"url": "https://github.com/matrix-org/node-irc/commit/2976c856df37660a9d664e94c857c796de2e34f7"
@@ -54,7 +63,10 @@
5463
}
5564
],
5665
"database_specific": {
57-
"cwe_ids": [],
66+
"cwe_ids": [
67+
"CWE-74",
68+
"CWE-93"
69+
],
5870
"severity": "HIGH",
5971
"github_reviewed": true,
6072
"github_reviewed_at": "2022-05-05T16:00:50Z",

0 commit comments

Comments
 (0)