CVE-2022-31070: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Finastra finastra-nodejs-libs
NestJS Proxy is a NestJS module to decorate and proxy calls. Prior to version 0.7.0, the nestjs-proxy library did not have a way to block sensitive cookies (e.g. session cookies) from being forwarded to backend services configured by the application developer. This could have led to sensitive cookies being inadvertently exposed to such services that should not see them. The patched version now blocks cookies from being forwarded by default. However developers can configure an allow-list of cookie names by using the `allowedCookies` config setting. This issue has been fixed in version 0.7.0 of `@finastra/nestjs-proxy`. Users of `@ffdc/nestjs-proxy` are advised that this package has been deprecated and is no longer being maintained or receiving updates. Such users should update their package.json file to use `@finastra/nestjs-proxy` instead.
AI Analysis
Technical Summary
CVE-2022-31070 is a vulnerability classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. It affects the Finastra Node.js library package `@finastra/nestjs-proxy`, specifically versions prior to 0.7.0. This package is a NestJS module designed to decorate and proxy calls to backend services. The vulnerability arises because, before version 0.7.0, the library did not implement any mechanism to block sensitive cookies, such as session cookies, from being forwarded to backend services. Consequently, these sensitive cookies could be inadvertently exposed to backend services that should not have access to them, potentially allowing unauthorized actors who control or compromise those backend services to hijack sessions or gain unauthorized access. The issue was addressed in version 0.7.0 by introducing a default behavior that blocks cookies from being forwarded. Developers can override this behavior by specifying an allow-list of cookie names via the `allowedCookies` configuration setting, which should be used cautiously. Additionally, users of the deprecated package `@ffdc/nestjs-proxy` are advised to migrate to `@finastra/nestjs-proxy` since the former is no longer maintained or updated. There are no known exploits in the wild reported for this vulnerability, and no CVSS score has been assigned. The vulnerability primarily impacts confidentiality by exposing sensitive session information, but it does not directly affect integrity or availability. Exploitation requires the application to use an affected version of the library and proxy calls to backend services that should not receive sensitive cookies. No authentication or user interaction is explicitly required for exploitation, but the attacker would need access to the backend services receiving the cookies or the ability to intercept such traffic.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive session cookies, which can lead to session hijacking or unauthorized access to protected resources. Organizations using Finastra's Node.js libraries in their web applications or middleware that proxy requests to backend services are at risk if they have not updated to version 0.7.0 or later. The exposure of session cookies can compromise user confidentiality and trust, potentially leading to data breaches involving personal data protected under GDPR. Financial institutions and other sectors relying on Finastra's software components may face regulatory and reputational damage if sensitive information is leaked. The impact is heightened in environments where backend services are managed by third parties or have weaker security controls, increasing the likelihood that exposed cookies could be intercepted or misused. However, since exploitation requires specific application configurations and no widespread exploits are reported, the immediate risk is moderate but should not be underestimated, especially in critical sectors such as banking, insurance, and financial services prevalent in Europe.
Mitigation Recommendations
1. Immediate upgrade to `@finastra/nestjs-proxy` version 0.7.0 or later to ensure the default blocking of sensitive cookies is enforced. 2. Audit existing applications to identify usage of the deprecated `@ffdc/nestjs-proxy` package and migrate to the maintained `@finastra/nestjs-proxy` package. 3. Review and minimize the `allowedCookies` configuration to only include cookies that are absolutely necessary to forward, avoiding broad allow-lists that could reintroduce exposure risks. 4. Implement strict backend service access controls and network segmentation to limit exposure of proxied requests and cookies to only trusted services. 5. Conduct security reviews and penetration testing focused on cookie handling and proxy configurations to detect inadvertent leakage. 6. Monitor logs and network traffic for unusual access patterns or unauthorized use of session cookies. 7. Educate developers on secure cookie handling practices, emphasizing the risks of forwarding sensitive cookies to backend services. 8. For organizations using Finastra products, coordinate with vendors to ensure timely updates and patches are applied across all affected systems.
Affected Countries
United Kingdom, Germany, France, Netherlands, Switzerland, Luxembourg, Ireland, Belgium
CVE-2022-31070: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Finastra finastra-nodejs-libs
Description
NestJS Proxy is a NestJS module to decorate and proxy calls. Prior to version 0.7.0, the nestjs-proxy library did not have a way to block sensitive cookies (e.g. session cookies) from being forwarded to backend services configured by the application developer. This could have led to sensitive cookies being inadvertently exposed to such services that should not see them. The patched version now blocks cookies from being forwarded by default. However developers can configure an allow-list of cookie names by using the `allowedCookies` config setting. This issue has been fixed in version 0.7.0 of `@finastra/nestjs-proxy`. Users of `@ffdc/nestjs-proxy` are advised that this package has been deprecated and is no longer being maintained or receiving updates. Such users should update their package.json file to use `@finastra/nestjs-proxy` instead.
AI-Powered Analysis
Technical Analysis
CVE-2022-31070 is a vulnerability classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. It affects the Finastra Node.js library package `@finastra/nestjs-proxy`, specifically versions prior to 0.7.0. This package is a NestJS module designed to decorate and proxy calls to backend services. The vulnerability arises because, before version 0.7.0, the library did not implement any mechanism to block sensitive cookies, such as session cookies, from being forwarded to backend services. Consequently, these sensitive cookies could be inadvertently exposed to backend services that should not have access to them, potentially allowing unauthorized actors who control or compromise those backend services to hijack sessions or gain unauthorized access. The issue was addressed in version 0.7.0 by introducing a default behavior that blocks cookies from being forwarded. Developers can override this behavior by specifying an allow-list of cookie names via the `allowedCookies` configuration setting, which should be used cautiously. Additionally, users of the deprecated package `@ffdc/nestjs-proxy` are advised to migrate to `@finastra/nestjs-proxy` since the former is no longer maintained or updated. There are no known exploits in the wild reported for this vulnerability, and no CVSS score has been assigned. The vulnerability primarily impacts confidentiality by exposing sensitive session information, but it does not directly affect integrity or availability. Exploitation requires the application to use an affected version of the library and proxy calls to backend services that should not receive sensitive cookies. No authentication or user interaction is explicitly required for exploitation, but the attacker would need access to the backend services receiving the cookies or the ability to intercept such traffic.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive session cookies, which can lead to session hijacking or unauthorized access to protected resources. Organizations using Finastra's Node.js libraries in their web applications or middleware that proxy requests to backend services are at risk if they have not updated to version 0.7.0 or later. The exposure of session cookies can compromise user confidentiality and trust, potentially leading to data breaches involving personal data protected under GDPR. Financial institutions and other sectors relying on Finastra's software components may face regulatory and reputational damage if sensitive information is leaked. The impact is heightened in environments where backend services are managed by third parties or have weaker security controls, increasing the likelihood that exposed cookies could be intercepted or misused. However, since exploitation requires specific application configurations and no widespread exploits are reported, the immediate risk is moderate but should not be underestimated, especially in critical sectors such as banking, insurance, and financial services prevalent in Europe.
Mitigation Recommendations
1. Immediate upgrade to `@finastra/nestjs-proxy` version 0.7.0 or later to ensure the default blocking of sensitive cookies is enforced. 2. Audit existing applications to identify usage of the deprecated `@ffdc/nestjs-proxy` package and migrate to the maintained `@finastra/nestjs-proxy` package. 3. Review and minimize the `allowedCookies` configuration to only include cookies that are absolutely necessary to forward, avoiding broad allow-lists that could reintroduce exposure risks. 4. Implement strict backend service access controls and network segmentation to limit exposure of proxied requests and cookies to only trusted services. 5. Conduct security reviews and penetration testing focused on cookie handling and proxy configurations to detect inadvertent leakage. 6. Monitor logs and network traffic for unusual access patterns or unauthorized use of session cookies. 7. Educate developers on secure cookie handling practices, emphasizing the risks of forwarding sensitive cookies to backend services. 8. For organizations using Finastra products, coordinate with vendors to ensure timely updates and patches are applied across all affected systems.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf349e
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 4:51:04 AM
Last updated: 8/9/2025, 10:20:02 AM
Views: 15
Related Threats
CVE-2025-49898: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Xolluteon Dropshix
MediumCVE-2025-55207: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in withastro astro
MediumCVE-2025-49897: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in gopiplus Vertical scroll slideshow gallery v2
HighCVE-2025-49432: CWE-862 Missing Authorization in FWDesign Ultimate Video Player
MediumCVE-2025-55203: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in makeplane plane
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.