The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json.
References
| Link | Resource |
|---|---|
| https://docs.npmjs.com/cli/v7/commands/npm-ci | Vendor Advisory |
| https://github.com/npm/cli/issues/2701 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/icatalina/CVE-2021-43616 | Third Party Advisory |
| https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0 | Exploit Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20211210-0002/ | Third Party Advisory |
| https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f | |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/ |
Information
Published : 2021-11-13 18:15
Updated : 2022-02-19 03:15
NVD link : CVE-2021-43616
Mitre link : CVE-2021-43616
JSON object : View
Products Affected
npmjs
- npm
netapp
- next_generation_application_programming_interface
CWE
CWE-345
Insufficient Verification of Data Authenticity
