发布时间: 2023年7月19日
修改时间: 2024年2月26日
A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process s stack memory to locate the permission model Permission::enabled_ in the host process s heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
NVD | openEuler | |
---|---|---|
CVSS评分 | 7.5 | 7.5 |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | None | None |
Integrity | High | High |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1534 | A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process s stack memory to locate the permission model Permission::enabled_ in the host process s heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js. | 2023年7月19日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | nodejs | Unaffected |
KY3.4-5 | nodejs | Unaffected |
KY3.5.1 | nodejs | Unaffected |
KY3.5.2 | nodejs | Unaffected |