Lucene search

K
cve[email protected]CVE-2023-32558
HistorySep 12, 2023 - 2:15 a.m.

CVE-2023-32558

2023-09-1202:15:12
CWE-22
web.nvd.nist.gov
154
cve-2023-32558
node.js
security vulnerability
experimental permission model

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

8.3

Confidence

High

EPSS

0.001

Percentile

22.1%

The use of the deprecated API process.binding() can bypass the permission model through path traversal.

This vulnerability affects all users using the experimental permission model in Node.js 20.x.

Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

Affected configurations

NVD
Node
nodejsnode.jsRange20.0.020.5.1-
CPENameOperatorVersion
nodejs:node.jsnodejs node.jslt20.5.1

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "vendor": "Node.js",
    "product": "Node.js",
    "versions": [
      {
        "version": "20.5.0",
        "status": "affected",
        "lessThanOrEqual": "20.5.0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

8.3

Confidence

High

EPSS

0.001

Percentile

22.1%