Логотип exploitDog
bind:CVE-2024-21896
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-21896

Количество 12

Количество 12

ubuntu логотип

CVE-2024-21896

почти 2 года назад

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2024-21896

почти 2 года назад

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.9
EPSS: Низкий
nvd логотип

CVE-2024-21896

почти 2 года назад

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2024-21896

больше 1 года назад

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2024-21896

почти 2 года назад

The permission model protects itself against path traversal attacks by ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-3q5r-g7hx-jv3c

почти 2 года назад

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.9
EPSS: Низкий
fstec логотип

BDU:2024-02879

около 2 лет назад

Уязвимость функции path.resolve() модели разрешений программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации

CVSS3: 7.9
EPSS: Низкий
rocky логотип

RLSA-2024:1688

больше 1 года назад

Important: nodejs:20 security update

EPSS: Низкий
rocky логотип

RLSA-2024:1687

больше 1 года назад

Important: nodejs:20 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-1688

больше 1 года назад

ELSA-2024-1688: nodejs:20 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-1687

больше 1 года назад

ELSA-2024-1687: nodejs:20 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0643-1

почти 2 года назад

Security update for nodejs20

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-21896

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 9.8
1%
Низкий
почти 2 года назад
redhat логотип
CVE-2024-21896

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.9
1%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-21896

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 9.8
1%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 9.8
1%
Низкий
больше 1 года назад
debian логотип
CVE-2024-21896

The permission model protects itself against path traversal attacks by ...

CVSS3: 9.8
1%
Низкий
почти 2 года назад
github логотип
GHSA-3q5r-g7hx-jv3c

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.9
1%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02879

Уязвимость функции path.resolve() модели разрешений программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации

CVSS3: 7.9
1%
Низкий
около 2 лет назад
rocky логотип
RLSA-2024:1688

Important: nodejs:20 security update

больше 1 года назад
rocky логотип
RLSA-2024:1687

Important: nodejs:20 security update

больше 1 года назад
oracle-oval логотип
ELSA-2024-1688

ELSA-2024-1688: nodejs:20 security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-1687

ELSA-2024-1687: nodejs:20 security update (IMPORTANT)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0643-1

Security update for nodejs20

почти 2 года назад

Уязвимостей на страницу