CVE Vulnerabilities

CVE-2023-32559

Published: Aug 24, 2023 | Modified: Oct 24, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(spawn_sync) run arbitrary code, outside of the limits defined in a policy.json file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

Affected Software

Name Vendor Start Version End Version
Node.js Nodejs 16.0.0 (including) 16.20.1 (including)
Node.js Nodejs 18.0.0 (including) 18.17.0 (including)
Node.js Nodejs 20.0.0 (including) 20.5.0 (including)
Nodejs Ubuntu bionic *
Nodejs Ubuntu jammy *
Nodejs Ubuntu lunar *
Nodejs Ubuntu mantic *
Nodejs Ubuntu trusty *
Nodejs Ubuntu xenial *
Red Hat Enterprise Linux 8 RedHat nodejs:16-8080020230906092006.63b34585 *
Red Hat Enterprise Linux 8 RedHat nodejs:18-8080020230825111344.63b34585 *
Red Hat Enterprise Linux 8.6 Extended Update Support RedHat nodejs:16-8060020230906023909.ad008a3a *
Red Hat Enterprise Linux 9 RedHat nodejs:18-9020020230825081254.rhel9 *
Red Hat Enterprise Linux 9 RedHat nodejs-1:16.20.2-1.el9_2 *
Red Hat Enterprise Linux 9.0 Extended Update Support RedHat nodejs-1:16.20.2-1.el9_0 *

References