{
  "threat_severity" : "Moderate",
  "public_date" : "2024-09-10T05:15:10Z",
  "bugzilla" : {
    "description" : "node-gettext: Prototype Pollution",
    "id" : "2311014",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2311014"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.9",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-1321",
  "details" : [ "All versions of the package node-gettext are vulnerable to Prototype Pollution via the addTranslations() function in gettext.js due to improper user input sanitization.", "A flaw was found in node-gettext. All versions of the package node-gettext are vulnerable to Prototype Pollution via the addTranslations() function in gettext.js due to improper user input sanitization." ],
  "affected_release" : [ {
    "product_name" : "RHODF-4.15-RHEL-9",
    "release_date" : "2025-02-26T00:00:00Z",
    "advisory" : "RHSA-2025:1865",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4.15::el9",
    "package" : "odf4/odf-console-rhel9:v4.15.12-1"
  }, {
    "product_name" : "RHODF-4.16-RHEL-9",
    "release_date" : "2025-02-25T00:00:00Z",
    "advisory" : "RHSA-2025:1829",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4.16::el9",
    "package" : "odf4/ocs-client-console-rhel9:v4.16.8-1"
  }, {
    "product_name" : "RHODF-4.16-RHEL-9",
    "release_date" : "2025-02-25T00:00:00Z",
    "advisory" : "RHSA-2025:1829",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4.16::el9",
    "package" : "odf4/odf-console-rhel9:v4.16.8-1"
  }, {
    "product_name" : "RHODF-4.16-RHEL-9",
    "release_date" : "2025-02-25T00:00:00Z",
    "advisory" : "RHSA-2025:1829",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4.16::el9",
    "package" : "odf4/odf-multicluster-console-rhel9:v4.16.8-1"
  }, {
    "product_name" : "RHODF-4.17-RHEL-9",
    "release_date" : "2025-02-25T00:00:00Z",
    "advisory" : "RHSA-2025:1824",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4.17::el9",
    "package" : "odf4/odf-console-rhel9:v4.17.5-1"
  }, {
    "product_name" : "RHODF-4.18-RHEL-9",
    "release_date" : "2025-03-11T00:00:00Z",
    "advisory" : "RHSA-2025:2652",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4.18::el9",
    "package" : "odf4/ocs-client-console-rhel9:v4.18.0-65"
  }, {
    "product_name" : "RHODF-4.18-RHEL-9",
    "release_date" : "2025-03-11T00:00:00Z",
    "advisory" : "RHSA-2025:2652",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4.18::el9",
    "package" : "odf4/odf-console-rhel9:v4.18.0-65"
  }, {
    "product_name" : "RHODF-4.18-RHEL-9",
    "release_date" : "2025-03-11T00:00:00Z",
    "advisory" : "RHSA-2025:2652",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4.18::el9",
    "package" : "odf4/odf-multicluster-console-rhel9:v4.18.0-64"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Will not fix",
    "package_name" : "openshift4/ose-console",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat Openshift Data Foundation 4",
    "fix_state" : "Affected",
    "package_name" : "odf4/odf-console-rhel9",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4"
  }, {
    "product_name" : "Red Hat Openshift Data Foundation 4",
    "fix_state" : "Affected",
    "package_name" : "odf4/odf-multicluster-console-rhel9",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4"
  }, {
    "product_name" : "Red Hat OpenShift Virtualization 4",
    "fix_state" : "Affected",
    "package_name" : "container-native-virtualization/kubevirt-console-plugin",
    "cpe" : "cpe:/a:redhat:container_native_virtualization:4"
  }, {
    "product_name" : "Red Hat OpenShift Virtualization 4",
    "fix_state" : "Will not fix",
    "package_name" : "container-native-virtualization/kubevirt-console-plugin-rhel9",
    "cpe" : "cpe:/a:redhat:container_native_virtualization:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-21528\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-21528\nhttps://github.com/alexanderwallin/node-gettext/blob/65d9670f691c2eeca40dce129c95bcf8b613d344/lib/gettext.js%23L113\nhttps://security.snyk.io/vuln/SNYK-JS-NODEGETTEXT-6100943" ],
  "name" : "CVE-2024-21528",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}