www.tenable.com Open in urlscan Pro
2606:4700::6810:3005  Public Scan

URL: https://www.tenable.com/plugins/nessus/182618
Submission: On September 19 via api from IN — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

 * 
 * Plugins

 * Settings
   
   LINKS
   
   Tenable Cloud Tenable Community & Support Tenable University
   
   Severity
   VPRCVSS v2CVSS v3
   
   Theme
   LightDarkAuto
   
   Help


 * 
 * Plugins
   OverviewPlugins PipelineNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM
   FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin FamiliesRelease
   Notes
 * Audits
   OverviewNewestUpdatedSearch Audit FilesSearch
   ItemsReferencesAuthoritiesDocumentationDownload All Audit Files
 * Policies
   OverviewSearchAWS ResourcesAzure ResourcesGCP ResourcesKubernetes Resources
 * Indicators
   OverviewSearchIndicators of AttackIndicators of Exposure
 * CVEs
   OverviewNewestUpdatedSearch
 * Attack Path Techniques
   OverviewSearch
    * Links
      Tenable CloudTenable Community & SupportTenable University
    * Settings
      Severity
      VPRCVSS v2CVSS v3
      Theme
      LightDarkAuto

DETECTIONS

 * Plugins
   OverviewPlugins PipelineRelease NotesNewestUpdatedSearchNessus FamiliesWAS
   FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin
   Families
 * Audits
   OverviewNewestUpdatedSearch Audit FilesSearch
   ItemsReferencesAuthoritiesDocumentationDownload All Audit Files
 * Policies
   OverviewSearchAWS ResourcesAzure ResourcesGCP ResourcesKubernetes Resources
 * Indicators
   OverviewSearchIndicators of AttackIndicators of Exposure

ANALYTICS

 * CVEs
   OverviewNewestUpdatedSearch
 * Attack Path Techniques
   OverviewSearch

 1. Plugins
 2. Nessus
 3. 182618

 1. Nessus


ROCKY LINUX 9 : NODEJS:18 (RLSA-2023:5363)

CRITICAL NESSUS PLUGIN ID 182618

 * Information
 * Dependencies
 * Dependents
 * Changelog

SYNOPSIS

The remote Rocky Linux host is missing one or more security updates.


DESCRIPTION

The remote Rocky Linux 9 host has packages installed that are affected by
multiple vulnerabilities as referenced in the RLSA-2023:5363 advisory.

- Versions of the package semver before 7.5.2 are vulnerable to Regular
Expression Denial of Service (ReDoS) via the function new Range, when untrusted
user data is provided as a range. (CVE-2022-25883)

- The use of `Module._load()` can bypass the policy mechanism and require
modules outside of the policy.json definition for a given module. This
vulnerability affects all users using the experimental policy mechanism in all
active release lines: 16.x, 18.x and, 20.x. Please note that at the time this
CVE was issued, the policy is an experimental feature of Node.js.
(CVE-2023-32002)

- The use of `module.constructor.createRequire()` can bypass the policy
mechanism and require modules outside of the policy.json definition for a given
module. This vulnerability affects all users using the experimental policy
mechanism in all active release lines: 16.x, 18.x, and, 20.x. Please note that
at the time this CVE was issued, the policy is an experimental feature of
Node.js. (CVE-2023-32006)

- A privilege escalation vulnerability exists in the experimental policy
mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the
deprecated API `process.binding()` can bypass the policy mechanism by requiring
internal modules and eventually take advantage of
`process.binding('spawn_sync')` run arbitrary code, outside of the limits
defined in a `policy.json` file. Please note that at the time this CVE was
issued, the policy is an experimental feature of Node.js. (CVE-2023-32559)

Note that Nessus has not tested for these issues but has instead relied only on
the application's self-reported version number.


SOLUTION

Update the affected packages.


SEE ALSO

https://errata.rockylinux.org/RLSA-2023:5363

https://bugzilla.redhat.com/show_bug.cgi?id=2216475

https://bugzilla.redhat.com/show_bug.cgi?id=2223313

https://bugzilla.redhat.com/show_bug.cgi?id=2230948

https://bugzilla.redhat.com/show_bug.cgi?id=2230955

https://bugzilla.redhat.com/show_bug.cgi?id=2230956

https://bugzilla.redhat.com/show_bug.cgi?id=2234404

PLUGIN DETAILS

Severity: Critical

ID: 182618

File Name: rocky_linux_RLSA-2023-5363.nasl

Version: 1.1

Type: local

Family: Rocky Linux Local Security Checks

Published: 10/5/2023

Updated: 11/6/2023





Supported Sensors: Nessus



RISK INFORMATION



VPR

Risk Factor: Medium

Score: 6.7

CVSS V2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C



CVSS Score Source: CVE-2023-32002

CVSS V3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C



VULNERABILITY INFORMATION

CPE: p-cpe:/a:rocky:linux:nodejs-full-i18n, p-cpe:/a:rocky:linux:nodejs-docs,
p-cpe:/a:rocky:linux:nodejs-debuginfo,
p-cpe:/a:rocky:linux:nodejs-packaging-bundler,
p-cpe:/a:rocky:linux:nodejs-nodemon, p-cpe:/a:rocky:linux:nodejs,
p-cpe:/a:rocky:linux:npm, p-cpe:/a:rocky:linux:nodejs-devel,
p-cpe:/a:rocky:linux:nodejs-debugsource, p-cpe:/a:rocky:linux:nodejs-packaging,
cpe:/o:rocky:linux:9

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release,
Host/RockyLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available



Patch Publication Date: 10/5/2023

Vulnerability Publication Date: 6/21/2023



REFERENCE INFORMATION

CVE: CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559


 * Tenable.com
 * Community & Support
 * Documentation
 * Education

 * © 2024 Tenable®, Inc. All Rights Reserved
 * Privacy Policy
 * Legal
 * 508 Compliance