Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-30581

Опубликовано: 20 июн. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

The use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js

A vulnerability has been discovered in Node.js, where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.

Отчет

This vulnerability is rated as an IMPORTANT severity because this vulnerability is a policy bypass resulting from the improper handling of the JavaScript prototype chain. A malicious actor can trigger this flaw by using process.mainModule.proto.require() to load and execute modules explicitly disallowed by the policy.json configuration. Successful exploitation allows for the execution of unauthorized code within the context of the application process, leading to a compromise of system integrity. At the time of this CVE's disclosure, the affected policy mechanism was designated as an experimental feature.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:14/nodejsWill not fix
Red Hat Software Collectionsrh-nodejs14-nodejsWill not fix
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:453608.08.2023
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:453708.08.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportnodejsFixedRHSA-2023:536126.09.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:433031.07.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:433131.07.2023
Red Hat Enterprise Linux 9.0 Extended Update SupportnodejsFixedRHSA-2023:553309.10.2023

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2219824nodejs: mainModule.proto bypass experimental policy mechanism

EPSS

Процентиль: 4%
0.00017
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js

CVSS3: 7.5
nvd
больше 2 лет назад

The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js

CVSS3: 7.5
debian
больше 2 лет назад

The use of __proto__ in process.mainModule.__proto__.require() can byp ...

CVSS3: 7.5
github
больше 2 лет назад

The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js

CVSS3: 7.5
fstec
почти 3 года назад

Уязвимость функции process.mainModule.proto.require() программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 4%
0.00017
Низкий

7.5 High

CVSS3