Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2023-32003
HistoryAug 15, 2023 - 4:15 p.m.

CVE-2023-32003

2023-08-1516:15:10
Alpine Linux Development Team
security.alpinelinux.org
13
node.js
fs.mkdtemp
path traversal
permission model
vulnerability
experimental feature
unix

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

21.0%

fs.mkdtemp() and fs.mkdtempSync() can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory.

This vulnerability affects all users using the experimental permission model in Node.js 20.

Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

OSVersionArchitecturePackageVersionFilename
Alpine3.15-mainnoarchnodejs= 16.20.2-r0UNKNOWN
Alpine3.16-mainnoarchnodejs= 16.20.2-r0UNKNOWN
Alpine3.18-mainnoarchnodejs= 18.20.1-r0UNKNOWN
Alpine3.17-mainnoarchnodejs= 18.20.1-r0UNKNOWN

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

21.0%