Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-30583

Опубликовано: 20 июн. 2023
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the --allow-fs-read flag in Node.js 20. This flaw arises from a missing check in the fs.openAsBlob() API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

A vulnerability has been identified in Node.js version 20, where fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the --allow-fs-read flag in Node.js 20. This flaw arises from a missing check in the fs.openAsBlob() API.

Отчет

Red Hat does not ship Node.js 20.x in any version of RHEL.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:14/nodejsNot affected
Red Hat Enterprise Linux 8nodejs:16/nodejsNot affected
Red Hat Enterprise Linux 8nodejs:18/nodejsNot affected
Red Hat Enterprise Linux 9nodejsNot affected
Red Hat Enterprise Linux 9nodejs:18/nodejsNot affected
Red Hat Software Collectionsrh-nodejs14-nodejsNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2219833nodejs: fs.openAsBlob bypass in experimental permission model

EPSS

Процентиль: 1%
0.00013
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
11 месяцев назад

fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the `--allow-fs-read` flag in Node.js 20. This flaw arises from a missing check in the `fs.openAsBlob()` API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
nvd
11 месяцев назад

fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the `--allow-fs-read` flag in Node.js 20. This flaw arises from a missing check in the `fs.openAsBlob()` API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
debian
11 месяцев назад

fs.openAsBlob() can bypass the experimental permission model when usin ...

CVSS3: 7.5
github
11 месяцев назад

fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the `--allow-fs-read` flag in Node.js 20. This flaw arises from a missing check in the `fs.openAsBlob()` API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 5.3
fstec
около 2 лет назад

Уязвимость метода fs.openAsBlob() программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 1%
0.00013
Низкий

5.3 Medium

CVSS3