Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-7160

Опубликовано: 08 мар. 2018
Источник: redhat
CVSS3: 5.8
EPSS Низкий

Описание

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

It was found that when a Node.js script is run in inspector mode, Node.js did not properly validate the Host header, leaving the inspector vulnerable to a DNS rebind attack and bypass same-origin policy. If a developer had an inspector session running, and was visiting a malicious website, the site could carry on a DNS rebind attack, allowing the site to have full access to the debugged script.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejsNot affected
Red Hat OpenShift Enterprise 3nodejsNot affected
Red Hat Software Collectionsrh-nodejs4-nodejsNot affected
Red Hat Software Collectionsrh-nodejs6-nodejsWill not fix
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-nodejs8-nodejsFixedRHSA-2018:294918.10.2018
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSrh-nodejs8-nodejsFixedRHSA-2018:294918.10.2018
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUSrh-nodejs8-nodejsFixedRHSA-2018:294918.10.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1561979nodejs: Inspector DNS rebinding vulnerability

EPSS

Процентиль: 78%
0.01169
Низкий

5.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 7 лет назад

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

CVSS3: 8.8
nvd
около 7 лет назад

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

CVSS3: 8.8
debian
около 7 лет назад

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebindi ...

CVSS3: 8.8
github
около 3 лет назад

Withdrawn Advisory: Node.js Inspector RCE via DNS Rebinding

suse-cvrf
около 7 лет назад

Security update for nodejs6

EPSS

Процентиль: 78%
0.01169
Низкий

5.8 Medium

CVSS3