Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2018-7160

Published: 17 May 2018

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

Priority

Medium

Cvss 3 Severity Score

8.8

Score breakdown

Status

Package Release Status
nodejs
Launchpad, Ubuntu, Debian
artful Ignored
(end of life)
bionic
Released (8.10.0~dfsg-2ubuntu0.4+esm1)
Available with Ubuntu Pro
cosmic Not vulnerable
(8.11.2~dfsg-1)
disco Not vulnerable
(8.11.2~dfsg-1)
eoan Not vulnerable
(8.11.2~dfsg-1)
focal Not vulnerable
(8.11.2~dfsg-1)
groovy Not vulnerable
(8.11.2~dfsg-1)
hirsute Not vulnerable
(8.11.2~dfsg-1)
impish Not vulnerable
(8.11.2~dfsg-1)
jammy Not vulnerable
(8.11.2~dfsg-1)
kinetic Not vulnerable
(8.11.2~dfsg-1)
lunar Not vulnerable
(8.11.2~dfsg-1)
trusty Not vulnerable
(code not present)
upstream
Released (8.11.1~dfsg-2)
xenial Not vulnerable
(code not present)

Severity score breakdown

Parameter Value
Base score 8.8
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H