TencentOS Server 3: nodejs:18 (TSSA-2023:0232)

high Nessus Plugin ID 239225

Synopsis

The remote TencentOS Server 3 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2023:0232 advisory.

Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:

CVE-2022-25883:
Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.

CVE-2023-32002:
The use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.

This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.

Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

CVE-2023-32006:
The use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.

This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.

Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

CVE-2023-32559:
A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding('spawn_sync') run arbitrary code, outside of the limits defined in a policy.json file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20230232.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25883

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32002

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32006

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32559

Plugin Details

Severity: High

ID: 239225

File Name: tencentos_TSSA_2023_0232.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:nodejs-packaging, cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:nodejs, p-cpe:/a:tencent:tencentos_server:nodejs-nodemon

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/23/2023

Vulnerability Publication Date: 10/23/2023