BIT-node-2023-30586

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/node/BIT-node-2023-30586.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-node-2023-30586
Aliases
Published
2024-03-06T11:01:15.387Z
Modified
2024-09-11T06:13:42.451483Z
Summary
[none]
Details

A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process's stack memory to locate the permission model Permission::enabled_ in the host process's heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

Database specific
{
    "cpes": [
        "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / node

Package

Name
node
Purl
pkg:bitnami/node

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
20.0.0
Fixed
20.3.1