First published: Thu Aug 10 2023(Updated: )
The use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Security Advisory: <a href="https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006">https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Node.js | >=16.x>=18.x>=20.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2230955 is classified as medium due to its impact on module policy enforcement.
To fix REDHAT-BUG-2230955, update Node.js to the latest version that resolves policy mechanism vulnerabilities.
REDHAT-BUG-2230955 affects Node.js versions 16.x, 18.x, and 20.x.
Yes, the policy mechanism involved in REDHAT-BUG-2230955 is an experimental feature in Node.js.
Yes, REDHAT-BUG-2230955 can allow unauthorized access to modules outside the defined policy.json.