First published: Mon Oct 16 2023(Updated: )
Node.js could allow a remote attacker to bypass security restrictions, caused by the circumvention of integrity checks by the policy feature. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass the experimental permission model.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nodejs Node.js | >=18.0.0<=18.18.1 | |
Nodejs Node.js | >=20.1.0<=20.8.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
IBM Cognos Analytics | <=12.0.0-12.0.2 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-38552.
The severity of CVE-2023-38552 is medium (severity value: 4).
CVE-2023-38552 affects all users of Node.js.
The impact of CVE-2023-38552 is that the vulnerability allows an application to disable the integrity check of a resource.
Yes, you can find references for CVE-2023-38552 at the following links: [https://hackerone.com/reports/2094235](https://hackerone.com/reports/2094235), [https://nodejs.org/en/blog/vulnerability/october-2023-security-releases](https://nodejs.org/en/blog/vulnerability/october-2023-security-releases), [https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2244472](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2244472).