Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m33v-338h-4v9f

Опубликовано: 26 фев. 2021
Источник: github
Github: Прошло ревью

Описание

Path traversal in Node-Red

Impact

This vulnerability allows arbitrary path traversal via the Projects API.

If the Projects feature is enabled, a user with projects.read permission is able to access any file via the Projects API.

Patches

The issue has been patched in Node-RED 1.2.8

Workarounds

The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED.

The primary workaround is not give untrusted users read access to the Node-RED editor.

For more information

If you have any questions or comments about this advisory:

Acknowledgements

Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.

Пакеты

Наименование

@node-red/runtime

npm
Затронутые версииВерсия исправления

< 1.2.8

1.2.8

EPSS

Процентиль: 58%
0.00365
Низкий

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 3.5
nvd
почти 5 лет назад

Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier has a vulnerability which allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API. The issue has been patched in Node-RED 1.2.8. The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. The primary workaround is not give untrusted users read access to the Node-RED editor.

EPSS

Процентиль: 58%
0.00365
Низкий

Дефекты

CWE-22