Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-30583

Опубликовано: 07 сент. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the --allow-fs-read flag in Node.js 20. This flaw arises from a missing check in the fs.openAsBlob() API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

code not present
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-apps/noble

not-affected

code not present
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present

Показывать по

EPSS

Процентиль: 2%
0.00016
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 2 лет назад

fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the `--allow-fs-read` flag in Node.js 20. This flaw arises from a missing check in the `fs.openAsBlob()` API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
nvd
около 1 года назад

fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the `--allow-fs-read` flag in Node.js 20. This flaw arises from a missing check in the `fs.openAsBlob()` API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
debian
около 1 года назад

fs.openAsBlob() can bypass the experimental permission model when usin ...

CVSS3: 7.5
github
около 1 года назад

fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the `--allow-fs-read` flag in Node.js 20. This flaw arises from a missing check in the `fs.openAsBlob()` API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 5.3
fstec
больше 2 лет назад

Уязвимость метода fs.openAsBlob() программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 2%
0.00016
Низкий

7.5 High

CVSS3