Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2018-7160
PUBLISHED
More InfoOfficial Page
Assigner-nodejs
Assigner Org ID-386269d4-a6c6-4eaa-bf8e-bc0b0d010558
View Known Exploited Vulnerability (KEV) details
Published At-17 May, 2018 | 14:00
Updated At-17 Sep, 2024 | 01:35
Rejected At-
▼CVE Numbering Authority (CNA)

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

Affected Products
Vendor
Node.js (OpenJS Foundation)The Node.js Project
Product
Node.js
Versions
Affected
  • ^6.0.0 || ^8.0.0 || ^9.0.0
Problem Types
TypeCWE IDDescription
CWECWE-350CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.oracle.com//security-alerts/cpujul2021.html
x_refsource_MISC
https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
x_refsource_CONFIRM
https://support.f5.com/csp/article/K63025104?utm_source=f5support&amp%3Butm_medium=RSS
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.oracle.com//security-alerts/cpujul2021.html
x_refsource_MISC
x_transferred
https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
x_refsource_CONFIRM
x_transferred
https://support.f5.com/csp/article/K63025104?utm_source=f5support&amp%3Butm_medium=RSS
x_refsource_CONFIRM
x_transferred
Details not found