Vulnerabilites related to Node - https://github.com/nodejs/node
cve-2023-46809
Vulnerability from cvelistv5
Published
2024-09-07 16:03
Modified
2024-09-09 18:00
Summary
Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.
Impacted products
Vendor Product Version
Node https://github.com/nodejs/node Version: 21.6.0    21.6.0
Version: 20.11.0    20.11.0
Version: 18.19.0    18.19.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:nodejs:nodejs:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "nodejs",
                  vendor: "nodejs",
                  versions: [
                     {
                        lessThanOrEqual: "18.19.0",
                        status: "affected",
                        version: "18.0",
                        versionType: "semver",
                     },
                     {
                        lessThanOrEqual: "20.11.0",
                        status: "affected",
                        version: "20.0",
                        versionType: "semver",
                     },
                     {
                        lessThanOrEqual: "21.6.0",
                        status: "affected",
                        version: "21.0",
                        versionType: "semver",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "HIGH",
                     attackVector: "NETWORK",
                     availabilityImpact: "NONE",
                     baseScore: 7.4,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-46809",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-09T17:40:41.999808Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-385",
                        description: "CWE-385 Covert Timing Channel",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-09T18:00:37.229Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "https://github.com/nodejs/node",
               vendor: "Node",
               versions: [
                  {
                     lessThanOrEqual: "21.6.0",
                     status: "affected",
                     version: "21.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "20.11.0",
                     status: "affected",
                     version: "20.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "18.19.0",
                     status: "affected",
                     version: "18.19.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-09-07T16:03:32.996Z",
            orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
            shortName: "hackerone",
         },
         references: [
            {
               url: "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
      assignerShortName: "hackerone",
      cveId: "CVE-2023-46809",
      datePublished: "2024-09-07T16:03:32.996Z",
      dateReserved: "2023-10-27T01:00:13.401Z",
      dateUpdated: "2024-09-09T18:00:37.229Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}