CVE Vulnerabilities

CVE-2018-7160

Authentication Bypass by Spoofing

Published: May 17, 2018 | Modified: Nov 07, 2023
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

Weakness

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Affected Software

Name Vendor Start Version End Version
Node.js Nodejs 6.0.0 (including) 6.8.1 (including)
Node.js Nodejs 6.9.0 (including) 6.14.0 (excluding)
Node.js Nodejs 8.0.0 (including) 8.8.1 (including)
Node.js Nodejs 8.9.0 (including) 8.11.0 (excluding)
Node.js Nodejs 9.0.0 (including) 9.10.0 (excluding)

References