Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-21891

Опубликовано: 19 фев. 2024
Источник: redhat
CVSS3: 6.6

Описание

Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

A flaw was found in Node.js. Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwritten with user-defined implementations, leading to a filesystem permission model bypass through a path traversal attack.

Отчет

This vulnerability affects users using the experimental permission model in active release lines 20.x and 21.x.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:16/nodejsNot affected
Red Hat Enterprise Linux 8nodejs:18/nodejsNot affected
Red Hat Enterprise Linux 9nodejsNot affected
Red Hat Enterprise Linux 9nodejs:18/nodejsNot affected
Red Hat Enterprise Linux 8nodejsFixedRHSA-2024:168708.04.2024
Red Hat Enterprise Linux 9nodejsFixedRHSA-2024:168808.04.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2265720nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 1 года назад

Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 8.8
nvd
больше 1 года назад

Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 8.8
msrc
12 месяцев назад

Описание отсутствует

CVSS3: 8.8
debian
больше 1 года назад

Node.js depends on multiple built-in utility functions to normalize pa ...

CVSS3: 7.9
github
больше 1 года назад

Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

6.6 Medium

CVSS3