Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-7160

Опубликовано: 17 мая 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8
CVSS3: 8.8

Описание

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support, was needed
cosmic

not-affected

8.11.2~dfsg-1
devel

not-affected

8.11.2~dfsg-1
disco

not-affected

8.11.2~dfsg-1
eoan

not-affected

8.11.2~dfsg-1
esm-apps/bionic

released

8.10.0~dfsg-2ubuntu0.4+esm1
esm-apps/focal

not-affected

8.11.2~dfsg-1
esm-apps/jammy

not-affected

8.11.2~dfsg-1
esm-apps/xenial

not-affected

code not present

Показывать по

6.8 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 5.8
redhat
больше 7 лет назад

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

CVSS3: 8.8
nvd
около 7 лет назад

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

CVSS3: 8.8
debian
около 7 лет назад

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebindi ...

CVSS3: 8.8
github
около 3 лет назад

Withdrawn Advisory: Node.js Inspector RCE via DNS Rebinding

suse-cvrf
около 7 лет назад

Security update for nodejs6

6.8 Medium

CVSS2

8.8 High

CVSS3