First published: Thu Feb 16 2023(Updated: )
Node.js could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw when enable the experimental permissions option with --experimental-policy. By sending a specially-crafted request using process.mainModule.require(), an attacker could exploit this vulnerability to bypass Permissions and access non authorized modules.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <18-9020020230327152102.rhel9 | 18-9020020230327152102.rhel9 |
redhat/nodejs | <1:16.19.1-1.el9_2 | 1:16.19.1-1.el9_2 |
redhat/rh-nodejs14 | <0:3.6-2.el7 | 0:3.6-2.el7 |
redhat/rh-nodejs14-nodejs | <0:14.21.3-2.el7 | 0:14.21.3-2.el7 |
Nodejs Node.js | >=14.0.0<=14.14.0 | |
Nodejs Node.js | >=14.0.0<14.21.3 | |
Nodejs Node.js | >=16.0.0<=16.12.0 | |
Nodejs Node.js | >=16.0.0<16.19.1 | |
Nodejs Node.js | >=18.0.0<=18.11.0 | |
Nodejs Node.js | >=18.0.0<18.14.1 | |
Nodejs Node.js | >=19.0.0<19.6.1 | |
debian/nodejs | <=18.13.0+dfsg1-1 | 10.24.0~dfsg-1~deb10u1 10.24.0~dfsg-1~deb10u3 12.22.12~dfsg-1~deb11u4 |
redhat/Node.js | <19.6.1 | 19.6.1 |
redhat/Node.js | <18.14.1 | 18.14.1 |
redhat/Node.js | <16.19.1 | 16.19.1 |
redhat/Node.js | <14.21.3 | 14.21.3 |
IBM Cognos Controller | <=11.0.0 - 11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-23918 is a privilege escalation vulnerability in Node.js versions <19.6.1, <18.14.1, <16.19.1, and <14.21.3.
This vulnerability allows an attacker to bypass the experimental Permissions feature in Node.js and access unauthorized modules by using process.mainModule.require().
CVE-2023-23918 has a severity level of high.
To fix CVE-2023-23918, you need to update your Node.js version to 19.6.1 or higher, 18.14.1 or higher, 16.19.1 or higher, or 14.21.3 or higher.
You can find more information about CVE-2023-23918 on the Red Hat Bugzilla website, using the following links: [link1], [link2], [link3].