Loading HuntDB...

GHSA-wq4c-wm6x-jw44

GitHub Security Advisory

Withdrawn Advisory: Node.js Inspector RCE via DNS Rebinding

✓ GitHub Reviewed HIGH Withdrawn Has CVE

Advisory Details

## Withdrawn Advisory
This advisory has been withdrawn because this vulnerability affects inspector code in https://github.com/nodejs/node, not the [legacy debugger](https://nodejs.org/en/docs/inspector#legacy-debugger) at https://github.com/node-inspector/node-inspector. https://github.com/nodejs/node is not in a [supported ecosystem](https://github.com/github/advisory-database/blob/main/README.md#supported-ecosystems).

## Original Description
The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.

Affected Packages

npm node-inspector
Affected versions: 6.0

Related CVEs

Key Information

GHSA ID
GHSA-wq4c-wm6x-jw44
Published
May 13, 2022 1:08 AM
Last Modified
October 9, 2023 12:42 AM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
node-inspector
GitHub Reviewed
✓ Yes
Withdrawn
October 9, 2023 12:42 AM

Dataset

Last updated: September 21, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.