Описание
The use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20.
Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js
A vulnerability has been discovered in Node.js, where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.
Отчет
This vulnerability is rated as an IMPORTANT severity because this vulnerability is a policy bypass resulting from the improper handling of the JavaScript prototype chain. A malicious actor can trigger this flaw by using process.mainModule.proto.require() to load and execute modules explicitly disallowed by the policy.json configuration. Successful exploitation allows for the execution of unauthorized code within the context of the application process, leading to a compromise of system integrity. At the time of this CVE's disclosure, the affected policy mechanism was designated as an experimental feature.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 8 | nodejs:14/nodejs | Will not fix | ||
| Red Hat Software Collections | rh-nodejs14-nodejs | Will not fix | ||
| Red Hat Enterprise Linux 8 | nodejs | Fixed | RHSA-2023:4536 | 08.08.2023 |
| Red Hat Enterprise Linux 8 | nodejs | Fixed | RHSA-2023:4537 | 08.08.2023 |
| Red Hat Enterprise Linux 8.6 Extended Update Support | nodejs | Fixed | RHSA-2023:5361 | 26.09.2023 |
| Red Hat Enterprise Linux 9 | nodejs | Fixed | RHSA-2023:4330 | 31.07.2023 |
| Red Hat Enterprise Linux 9 | nodejs | Fixed | RHSA-2023:4331 | 31.07.2023 |
| Red Hat Enterprise Linux 9.0 Extended Update Support | nodejs | Fixed | RHSA-2023:5533 | 09.10.2023 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js
The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js
The use of __proto__ in process.mainModule.__proto__.require() can byp ...
The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js
Уязвимость функции process.mainModule.proto.require() программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
EPSS
7.5 High
CVSS3