Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-32002

Опубликовано: 09 авг. 2023
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

The use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.

Отчет

This vulnerability is rated Important instead of Critical because it only impacts users of the policy mechanism that must be explicitly enabled using the --experimental-policy flag. This is not enabled by default. Red Hat's Secure Software Development Life Cycle utilizes a layered testing approach. This significantly increases attack complexity, because a compromised package must remain undetected for months to years in testing in upstream communities before it could be adopted into a Red Hat product. This long dwell-time reduces impact to Important.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Software Collectionsrh-nodejs14-nodejsNot affected
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:536026.09.2023
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:536226.09.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportnodejsFixedRHSA-2023:536126.09.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:536326.09.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:553209.10.2023
Red Hat Enterprise Linux 9.0 Extended Update SupportnodejsFixedRHSA-2023:553309.10.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-213->CWE-1268
https://bugzilla.redhat.com/show_bug.cgi?id=2230948nodejs: Permissions policies can be bypassed via Module._load

EPSS

Процентиль: 6%
0.00029
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 2 года назад

The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

CVSS3: 9.8
nvd
почти 2 года назад

The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

msrc
4 месяца назад

HackerOne: CVE-2023-32002 Node.js `Module._load()` policy Remote Code Execution Vulnerability

CVSS3: 9.8
debian
почти 2 года назад

The use of `Module._load()` can bypass the policy mechanism and requir ...

CVSS3: 9.8
github
почти 2 года назад

The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

EPSS

Процентиль: 6%
0.00029
Низкий

8.1 High

CVSS3