Node.js Vulnerability: Path Traversal Attack via Experimental Permission Model
CVE-2024-21891

8.8HIGH

Key Information:

Vendor

Node.js

Status
Vendor
CVE Published:
20 February 2024

Badges

đź“° News Worthy

What is CVE-2024-21891?

A vulnerability exists in Node.js due to its reliance on built-in utility functions to normalize paths provided to the node:fs system. This weakness allows for user-defined implementations to overwrite these functions, which can result in a bypass of the filesystem permission model through a path traversal attack. It impacts users utilizing the experimental permission model in Node.js versions 20 and 21. Given that the permission model is still experimental, this introduces significant risk for users who may not be fully aware of the implications of this vulnerability. For further insights, reference material can be found in security advisories.

Affected Version(s)

Node.js 21.6.0

Node.js 20.11.0

News Articles

CVE-2024-21891 Archives

VulnerabilityFebruary 15, 2024Major Node.js Security Flaws: Millions of Apps Could Be VulnerableNode.js, the popular JavaScript runtime environment used by millions of developers worldwide, has recently...

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

CVSS V3.0

Score:
7.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • đź“°

    First article discovered by securityonline.info

  • Vulnerability published

  • Vulnerability Reserved

.