CVE-2023-30586 Vulnerability Details

  /     /     /  

CVE-2023-30586 Metadata Quick Info

CVE Published: 30/06/2023 | CVE Updated: 27/11/2024 | CVE Year: 2023
Source: hackerone | Vendor: Node.js | Product: https://github.com/nodejs/node
Status : PUBLISHED

CVE-2023-30586 Description

A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process\'s stack memory to locate the permission model Permission::enabled_ in the host process\'s heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name:
Source: Node.js

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).