First published: Tue Jun 20 2023(Updated: )
A vulnerability has been discovered in Node.js, where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <18-9020020230717125503.rhel9 | 18-9020020230717125503.rhel9 |
redhat/nodejs | <1:16.20.1-1.el9_2 | 1:16.20.1-1.el9_2 |
redhat/nodejs | <1:16.20.2-1.el9_0 | 1:16.20.2-1.el9_0 |
Nodejs Node.js | >=16.0.0<16.20.1 | |
Nodejs Node.js | >=18.0.0<18.16.1 | |
Nodejs Node.js | >=20.0.0<20.3.1 | |
<=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-30581 is a vulnerability that allows the use of __proto__ to bypass the policy mechanism in Node.js.
The severity of CVE-2023-30581 is high with a score of 7.5.
Node.js versions 16, 18, and 20 are affected by CVE-2023-30581.
CVE-2023-30581 can be exploited by using __proto__ in process.mainModule.__proto__.require() to require modules outside of the policy.json definition.
To fix CVE-2023-30581, it is recommended to update to the latest version of Node.js or apply the appropriate patches provided by the vendor.