Vulnerabilites related to Node - https://github.com/nodejs/node
cve-2023-46809
Vulnerability from cvelistv5
Published
2024-09-07 16:03
Modified
2024-09-09 18:00
Severity ?
EPSS score ?
Summary
Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Node | https://github.com/nodejs/node |
Version: 21.6.0 ≤ 21.6.0 Version: 20.11.0 ≤ 20.11.0 Version: 18.19.0 ≤ 18.19.0 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:nodejs:nodejs:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "nodejs", vendor: "nodejs", versions: [ { lessThanOrEqual: "18.19.0", status: "affected", version: "18.0", versionType: "semver", }, { lessThanOrEqual: "20.11.0", status: "affected", version: "20.0", versionType: "semver", }, { lessThanOrEqual: "21.6.0", status: "affected", version: "21.0", versionType: "semver", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2023-46809", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-09T17:40:41.999808Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-385", description: "CWE-385 Covert Timing Channel", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-09T18:00:37.229Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "https://github.com/nodejs/node", vendor: "Node", versions: [ { lessThanOrEqual: "21.6.0", status: "affected", version: "21.6.0", versionType: "semver", }, { lessThanOrEqual: "20.11.0", status: "affected", version: "20.11.0", versionType: "semver", }, { lessThanOrEqual: "18.19.0", status: "affected", version: "18.19.0", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.", }, ], providerMetadata: { dateUpdated: "2024-09-07T16:03:32.996Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2023-46809", datePublished: "2024-09-07T16:03:32.996Z", dateReserved: "2023-10-27T01:00:13.401Z", dateUpdated: "2024-09-09T18:00:37.229Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }