Vulnerability Description
A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `process.binding('spawn_sync')` run arbitrary code, outside of the limits defined in a `policy.json` file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nodejs | Node.Js | >= 16.0.0, <= 16.20.1 |
Related Weaknesses (CWE)
References
- https://hackerone.com/reports/1946470ExploitThird Party Advisory
- https://security.netapp.com/advisory/ntap-20231006-0006/Third Party Advisory
- https://hackerone.com/reports/1946470ExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/09/msg00029.html
- https://security.netapp.com/advisory/ntap-20231006-0006/Third Party Advisory
FAQ
What is CVE-2023-32559?
CVE-2023-32559 is a vulnerability with a CVSS score of 7.5 (HIGH). A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the pol...
How severe is CVE-2023-32559?
CVE-2023-32559 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-32559?
Check the references section above for vendor advisories and patch information. Affected products include: Nodejs Node.Js.