CVE-2023-32559

A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `process.binding('spawn_sync')` run arbitrary code, outside of the limits defined in a `policy.json` file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
hackeroneCNA
---
---
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 9%
VendorProductVersion
nodejsnodejs
𝑥
< 16.20.1
nodejsnodejs
𝑥
< 18.17.0
nodejsnodejs
𝑥
< 20.5.0
nodejsnode.js
16.0.0 ≤
𝑥
≤ 16.20.1
nodejsnode.js
18.0.0 ≤
𝑥
≤ 18.17.0
nodejsnode.js
20.0.0 ≤
𝑥
≤ 20.5.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nodejs
bullseye
vulnerable
buster
not-affected
bullseye (security)
12.22.12~dfsg-1~deb11u5
fixed
bookworm
18.19.0+dfsg-6~deb12u2
fixed
bookworm (security)
18.19.0+dfsg-6~deb12u1
fixed
trixie
20.18.1+dfsg-1
fixed
sid
20.18.1+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nodejs
noble
not-affected
mantic
Fixed 18.13.0+dfsg1-1ubuntu2.3
released
lunar
ignored
jammy
Fixed 12.22.9~dfsg-1ubuntu3.6
released
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected