First published: Thu Aug 10 2023(Updated: )
The use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Security Advisory: <a href="https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002">https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Node.js | >=16.x>=18.x>=20.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2230948 is considered high due to the ability to bypass security policies.
To fix REDHAT-BUG-2230948, update Node.js to the latest stable version where this vulnerability is addressed.
Node.js versions 16.x, 18.x, and 20.x are affected by REDHAT-BUG-2230948.
Yes, the policy mechanism is relevant as the vulnerability allows bypassing it when using Module._load().
In REDHAT-BUG-2230948, the exploit allows requiring modules outside of the defined policy.json, potentially compromising application security.