Rapid7 Vulnerability & Exploit Database

Oracle Solaris 11: CVE-2018-7160 (11.4 SRU 32.88.3, 11.4 SRU 33.94.0)

Back to Search

Oracle Solaris 11: CVE-2018-7160 (11.4 SRU 32.88.3, 11.4 SRU 33.94.0)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
05/17/2018
Created
04/22/2021
Added
04/21/2021
Modified
02/17/2022

Description

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

Solution(s)

  • oracle-solaris-11-4-upgrade-runtime-nodejs-12-21-0-11-4-32-0-1-88-2
  • oracle-solaris-11-4-upgrade-runtime-nodejs-nodejs-10-10-22-1-11-4-32-0-1-88-2
  • oracle-solaris-11-4-upgrade-runtime-nodejs-nodejs-12-12-21-0-11-4-32-0-1-88-2
  • oracle-solaris-11-4-upgrade-runtime-nodejs-nodejs-14-14-16-0-11-4-33-0-1-94-0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;