• 公告ID (KylinSec-SA-2023-1534)

摘要:

A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process s stack memory to locate the permission model Permission::enabled_ in the host process s heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

安全等级: Low

公告ID: KylinSec-SA-2023-1534

发布日期: 2023年7月19日

关联CVE: CVE-2023-30586  

  • 详细介绍

1. 漏洞描述

   

A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process s stack memory to locate the permission model Permission::enabled_ in the host process s heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2023-30586 KY3.4-4A nodejs Unaffected
CVE-2023-30586 KY3.4-5 nodejs Unaffected
CVE-2023-30586 KY3.5.1 nodejs Unaffected
CVE-2023-30586 KY3.5.2 nodejs Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2023-1533 下一篇:KylinSec-SA-2023-1535