CVE-2023-30581
nodejs: mainModule.proto bypass experimental policy mechanism
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js
El uso de __proto__ en process.mainModule.__proto__.require() puede omitir el mecanismo de políticas y requerir módulos fuera de la definición de policy.json. Esta vulnerabilidad afecta a todos los usuarios que utilizan el mecanismo de política experimental en todas las líneas de lanzamiento activas: v16, v18 y v20. Tenga en cuenta que en el momento en que se emitió este CVE, la política era una característica experimental de Node.js.
A vulnerability has been discovered in Node.js, where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.
This update for nodejs12 fixes the following issues. Fixed permissions policies bypass via process.mainModule. Fixed permissions policies bypass via Module._load. Fixed permissions policies impersonation using module.constructor.createRequire. Fixed permissions policies bypass via process.binding. Fixed mainModule.proto bypass. Fixed missing DiffieHellman key generation. Fixed HTTP Request Smuggling via Empty headers separated by CR.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-04-13 CVE Reserved
- 2023-07-31 CVE Published
- 2025-06-05 CVE Updated
- 2025-07-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-862: Missing Authorization
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://nodejs.org/en/blog/vulnerability/june-2023-security-releases | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-30581 | 2023-10-09 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2219824 | 2023-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nodejs Search vendor "Nodejs" | Node.js Search vendor "Nodejs" for product "Node.js" | >= 16.0.0 < 16.20.1 Search vendor "Nodejs" for product "Node.js" and version " >= 16.0.0 < 16.20.1" | - |
Affected
| ||||||
Nodejs Search vendor "Nodejs" | Node.js Search vendor "Nodejs" for product "Node.js" | >= 18.0.0 < 18.16.1 Search vendor "Nodejs" for product "Node.js" and version " >= 18.0.0 < 18.16.1" | - |
Affected
| ||||||
Nodejs Search vendor "Nodejs" | Node.js Search vendor "Nodejs" for product "Node.js" | >= 20.0.0 < 20.3.1 Search vendor "Nodejs" for product "Node.js" and version " >= 20.0.0 < 20.3.1" | - |
Affected
|