Node.js — программная платформа, основанная на движке V8 (компилирующем JavaScript в машинный код)
Релизный цикл, информация об уязвимостях
График релизов
Количество 1 012

RLSA-2023:5708
Important: dotnet6.0 security update

RLSA-2023:5749
Important: .NET 7.0 security update

RLSA-2023:5765
Important: nodejs security update

RLSA-2023:5924
Important: varnish security update

RLSA-2023:5928
Important: tomcat security update

SUSE-SU-2023:4163-1
Security update for netty, netty-tcnative

BDU:2024-02879
Уязвимость функции path.resolve() модели разрешений программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации
GHSA-7xrv-q25v-f95m
A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
GHSA-x39v-frq9-5hh8
When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.
GHSA-9hm3-chgj-45rm
Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects. This is distinct from CVE-2023-32004 ([report 2038134](https://hackerone.com/reports/2038134)), which only referred to `Buffer` objects. However, the vulnerability follows the same pattern using `Uint8Array` instead of `Buffer`. Impacts: This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
![]() | RLSA-2023:5708 Important: dotnet6.0 security update | 94% Критический | почти 2 года назад | |
![]() | RLSA-2023:5749 Important: .NET 7.0 security update | 94% Критический | почти 2 года назад | |
![]() | RLSA-2023:5765 Important: nodejs security update | 94% Критический | почти 2 года назад | |
![]() | RLSA-2023:5924 Important: varnish security update | 94% Критический | почти 2 года назад | |
![]() | RLSA-2023:5928 Important: tomcat security update | 94% Критический | почти 2 года назад | |
![]() | SUSE-SU-2023:4163-1 Security update for netty, netty-tcnative | 94% Критический | почти 2 года назад | |
![]() | BDU:2024-02879 Уязвимость функции path.resolve() модели разрешений программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации | CVSS3: 7.9 | 1% Низкий | почти 2 года назад |
GHSA-7xrv-q25v-f95m A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js. | CVSS3: 7.7 | 0% Низкий | почти 2 года назад | |
GHSA-x39v-frq9-5hh8 When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js. | CVSS3: 7.5 | 0% Низкий | почти 2 года назад | |
GHSA-9hm3-chgj-45rm Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects. This is distinct from CVE-2023-32004 ([report 2038134](https://hackerone.com/reports/2038134)), which only referred to `Buffer` objects. However, the vulnerability follows the same pattern using `Uint8Array` instead of `Buffer`. Impacts: This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js. | CVSS3: 9.8 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу