The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Node.js | Nodejs | 6.0.0 (including) | 6.8.1 (including) |
Node.js | Nodejs | 6.9.0 (including) | 6.14.0 (excluding) |
Node.js | Nodejs | 8.0.0 (including) | 8.8.1 (including) |
Node.js | Nodejs | 8.9.0 (including) | 8.11.0 (excluding) |
Node.js | Nodejs | 9.0.0 (including) | 9.10.0 (excluding) |
Red Hat Software Collections for Red Hat Enterprise Linux 7 | RedHat | rh-nodejs8-nodejs-0:8.11.4-1.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS | RedHat | rh-nodejs8-nodejs-0:8.11.4-1.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS | RedHat | rh-nodejs8-nodejs-0:8.11.4-1.el7 | * |
Nodejs | Ubuntu | artful | * |
Nodejs | Ubuntu | bionic | * |
Nodejs | Ubuntu | esm-apps/bionic | * |
Nodejs | Ubuntu | upstream | * |