7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
19.3%
A privilege escalation vulnerability exists in the experimental policy
mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the
deprecated API process.binding()
can bypass the policy mechanism by
requiring internal modules and eventually take advantage of
process.binding('spawn_sync')
run arbitrary code, outside of the limits
defined in a policy.json
file. Please note that at the time this CVE was
issued, the policy is an experimental feature of Node.js.
github.com/nodejs/node/commit/4aa0eff787c14f14a239cf2f44bf751a0151e3eb (main)
github.com/nodejs/node/commit/d4570fae358693b8f7fec05294b9bb92a966226d (v18.x)
launchpad.net/bugs/cve/CVE-2023-32559
nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559
nvd.nist.gov/vuln/detail/CVE-2023-32559
security-tracker.debian.org/tracker/CVE-2023-32559
ubuntu.com/security/notices/USN-6822-1
www.cve.org/CVERecord?id=CVE-2023-32559