{"containers":{"cna":{"affected":[{"product":"Node","vendor":"NodeJS","defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"4.0","status":"affected","lessThan":"4.*"},{"versionType":"semver","version":"5.0","status":"affected","lessThan":"5.*"},{"versionType":"semver","version":"6.0","status":"affected","lessThan":"6.*"},{"versionType":"semver","version":"7.0","status":"affected","lessThan":"7.*"},{"versionType":"semver","version":"8.0","status":"affected","lessThan":"8.*"},{"versionType":"semver","version":"9.0","status":"affected","lessThan":"9.*"},{"versionType":"semver","version":"10.0","status":"affected","lessThan":"10.*"},{"versionType":"semver","version":"11.0","status":"affected","lessThan":"11.*"},{"versionType":"semver","version":"12.0","status":"affected","lessThan":"12.*"},{"versionType":"semver","version":"13.0","status":"affected","lessThan":"13.*"},{"versionType":"semver","version":"14.0","status":"affected","lessThan":"14.20.0"},{"versionType":"semver","version":"15.0","status":"affected","lessThan":"15.*"},{"versionType":"semver","version":"16.0","status":"affected","lessThan":"16.20.0"},{"versionType":"semver","version":"17.0","status":"affected","lessThan":"17.*"},{"versionType":"semver","version":"18.0","status":"affected","lessThan":"18.5.0"}]}],"descriptions":[{"lang":"en","value":"Node.js is vulnerable to Hijack Execution Flow: DLL Hijacking under certain conditions on Windows platforms.This vulnerability can be exploited if the victim has the following dependencies on a Windows machine:* OpenSSL has been installed and “C:\\Program Files\\Common Files\\SSL\\openssl.cnf” exists.Whenever the above conditions are present, `node.exe` will search for `providers.dll` in the current user directory.After that, `node.exe` will try to search for `providers.dll` by the DLL Search Order in Windows.It is possible for an attacker to place the malicious file `providers.dll` under a variety of paths and exploit this vulnerability."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-427","description":"Uncontrolled Search Path Element (CWE-427)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","shortName":"hackerone","dateUpdated":"2025-04-30T22:24:45.953Z"},"references":[{"tags":["x_refsource_MISC"],"url":"https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/"},{"tags":["x_refsource_MISC"],"url":"https://hackerone.com/reports/1447455"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20220915-0001/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"support@hackerone.com","ID":"CVE-2022-32223","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"https://github.com/nodejs/node","version":{"version_data":[{"version_value":"Fixed in 14.20.0+, 16.20.0+, 18.5.0+"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Node.js is vulnerable to Hijack Execution Flow: DLL Hijacking under certain conditions on Windows platforms.This vulnerability can be exploited if the victim has the following dependencies on a Windows machine:* OpenSSL has been installed and “C:\\Program Files\\Common Files\\SSL\\openssl.cnf” exists.Whenever the above conditions are present, `node.exe` will search for `providers.dll` in the current user directory.After that, `node.exe` will try to search for `providers.dll` by the DLL Search Order in Windows.It is possible for an attacker to place the malicious file `providers.dll` under a variety of paths and exploit this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Uncontrolled Search Path Element (CWE-427)"}]}]},"references":{"reference_data":[{"name":"https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/","refsource":"MISC","url":"https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/"},{"name":"https://hackerone.com/reports/1447455","refsource":"MISC","url":"https://hackerone.com/reports/1447455"},{"name":"https://security.netapp.com/advisory/ntap-20220915-0001/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20220915-0001/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T07:32:56.047Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://hackerone.com/reports/1447455"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20220915-0001/"}]}]},"cveMetadata":{"assignerOrgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","assignerShortName":"hackerone","cveId":"CVE-2022-32223","datePublished":"2022-07-14T14:51:18.000Z","dateReserved":"2022-06-01T00:00:00.000Z","dateUpdated":"2025-04-30T22:24:45.953Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}