Rapid7 Vulnerability & Exploit Database

Ubuntu: USN-4796-1 (CVE-2018-7160): Node.js vulnerabilities

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Ubuntu: USN-4796-1 (CVE-2018-7160): Node.js vulnerabilities

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
05/17/2018
Created
03/29/2023
Added
03/22/2023
Modified
05/01/2023

Description

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

Solution(s)

  • ubuntu-upgrade-nodejs
  • ubuntu-upgrade-nodejs-dev
  • ubuntu-upgrade-nodejs-doc
  • ubuntu-upgrade-nodejs-legacy

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;