{"id":"CVE-2023-32006","details":"The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.","aliases":["BIT-node-2023-32006","BIT-node-min-2023-32006"],"modified":"2026-04-02T08:30:41.070042Z","published":"2023-08-15T16:15:11.460Z","related":["ALSA-2023:5360","ALSA-2023:5362","ALSA-2023:5363","ALSA-2023:5532","CGA-8xvx-2v37-4343","MGASA-2023-0264","SUSE-SU-2023:3306-1","SUSE-SU-2023:3355-1","SUSE-SU-2023:3356-1","SUSE-SU-2023:3378-1","SUSE-SU-2023:3379-1","SUSE-SU-2023:3400-1","SUSE-SU-2023:3408-1","SUSE-SU-2023:3455-1","openSUSE-SU-2024:13117-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230915-0009/"},{"type":"REPORT","url":"https://hackerone.com/reports/2043807"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"last_affected":"b53c51995380b1f8d642297d848cab6010d2909c"},{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"last_affected":"a39b8a2a3e8414c8a54650bdfe4a46998282d88a"},{"introduced":"e7618fb5a5fc25d76b6474e2a6607f04fd6f10e0"},{"last_affected":"f13c7f5008ecbd166e6aba6702dfa84da1863ece"}],"database_specific":{"versions":[{"introduced":"16.0.0"},{"last_affected":"16.20.1"},{"introduced":"18.0.0"},{"last_affected":"18.17.0"},{"introduced":"20.0.0"},{"last_affected":"20.5.0"}]}}],"versions":["v16.0.0","v16.1.0","v16.10.0","v16.11.0","v16.11.1","v16.12.0","v16.13.0","v16.13.1","v16.13.2","v16.14.0","v16.14.1","v16.14.2","v16.15.0","v16.15.1","v16.16.0","v16.17.0","v16.17.1","v16.18.0","v16.18.1","v16.19.0","v16.19.1","v16.2.0","v16.20.0","v16.20.1","v16.3.0","v16.4.0","v16.4.1","v16.4.2","v16.5.0","v16.6.0","v16.6.1","v16.6.2","v16.7.0","v16.8.0","v16.9.0","v16.9.1","v18.0.0","v18.1.0","v18.10.0","v18.11.0","v18.12.0","v18.12.1","v18.13.0","v18.14.0","v18.14.1","v18.14.2","v18.15.0","v18.16.0","v18.16.1","v18.17.0","v18.2.0","v18.3.0","v18.4.0","v18.5.0","v18.6.0","v18.7.0","v18.8.0","v18.9.0","v18.9.1","v20.0.0","v20.1.0","v20.2.0","v20.3.0","v20.3.1","v20.4.0","v20.5.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32006.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}