vulnerability

Oracle Solaris 11: CVE-2018-7160 (11.4 SRU 32.88.3, 11.4 SRU 33.94.0)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
2018-05-17
Added
2021-04-21
Modified
2022-02-17

Description

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

Solution(s)

oracle-solaris-11-4-upgrade-runtime-nodejs-12-21-0-11-4-32-0-1-88-2oracle-solaris-11-4-upgrade-runtime-nodejs-nodejs-10-10-22-1-11-4-32-0-1-88-2oracle-solaris-11-4-upgrade-runtime-nodejs-nodejs-12-12-21-0-11-4-32-0-1-88-2oracle-solaris-11-4-upgrade-runtime-nodejs-nodejs-14-14-16-0-11-4-33-0-1-94-0
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.