CVE-2023-38552
Description
When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check.
Impacts:
This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x.
Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.
CWE
- (none)
Affected
- NodeJS / Node — v=4.0 <4.* [affected]; v=5.0 <5.* [affected]; v=6.0 <6.* [affected]; v=7.0 <7.* [affected]; v=8.0 <8.* [affected]; v=9.0 <9.* [affected]; v=10.0 <10.* [affected]; v=11.0 <11.* [affected]; v=12.0 <12.* [affected]; v=13.0 <13.* [affected]; v=14.0 <14.* [affected]; v=15.0 <15.* [affected]; v=16.0 <16.* [affected]; v=17.0 <17.* [affected]; v=18.0 <18.18.2 [affected]; v=19.0 <19.* [affected]; v=20.0 <20.8.1 [affected]
CVSS
- (none)
References
- https://hackerone.com/reports/2094235
- https://lists.fedoraproject.org/archives/list/[email protected]/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
- https://security.netapp.com/advisory/ntap-20231116-0013/
Source
cvelistV5-main/cves/2023/38xxx/CVE-2023-38552.json