DescriptionThe Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
- SUSE-SU-2018:1183-1, published Wed May 9 13:08:44 MDT 2018
- openSUSE-SU-2018:1209-1, published Fri, 11 May 2018 00:12:50 +0200 (CEST)
List of released packages
|Product(s)||Fixed package version(s)||References|
|SUSE Enterprise Storage 4|| ||Patchnames:
|SUSE Linux Enterprise Module for Web Scripting 12|| ||Patchnames:
|SUSE Linux Enterprise Module for Web Scripting 15|| ||Patchnames:
SUSE Linux Enterprise Module for Web Scripting 15 GA nodejs8
|SUSE OpenStack Cloud 7|| ||Patchnames:
|openSUSE Leap 42.3|| ||Patchnames:
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise Module for Web and Scripting 12||nodejs4||Not affected|
|SUSE Linux Enterprise Module for Web and Scripting 12||nodejs6||Released|
|SUSE Openstack Cloud 7||nodejs6||Released|
|SUSE Storage 4||nodejs4||Not affected|
|SUSE Storage 4||nodejs6||Released|
|SUSE Studio Onsite 1.3||nodejs||Not affected|