{"id":"BIT-node-2023-30586","details":"A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process's stack memory to locate the permission model Permission::enabled_ in the host process's heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.","aliases":["BIT-node-min-2023-30586","CVE-2023-30586"],"modified":"2025-04-03T14:40:37.652Z","published":"2024-03-06T11:01:15.387Z","database_specific":{"cpes":["cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"],"severity":"High"},"references":[{"type":"WEB","url":"https://hackerone.com/reports/1954535"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20230803-0008/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30586"}],"affected":[{"package":{"name":"node","ecosystem":"Bitnami","purl":"pkg:bitnami/node"},"ranges":[{"type":"SEMVER","events":[{"introduced":"20.0.0"},{"fixed":"20.3.1"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/node/BIT-node-2023-30586.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}],"schema_version":"1.7.3"}