Lucene search

K
cve[email protected]CVE-2023-39331
HistoryOct 18, 2023 - 4:15 a.m.

CVE-2023-39331

2023-10-1804:15:11
CWE-22
web.nvd.nist.gov
477
cve-2023-30584
patching vulnerability
path traversal
node.js
commit 205f1e6
permission model

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.2%

A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations.

Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

Affected configurations

NVD
Node
nodejsnode.jsRange20.0.0โ€“20.8.1-
CPENameOperatorVersion
nodejs:node.jsnodejs node.jslt20.8.1

CNA Affected

[
  {
    "vendor": "Node.js",
    "product": "Node.js",
    "versions": [
      {
        "version": "20.8.0",
        "status": "affected",
        "lessThanOrEqual": "20.8.0",
        "versionType": "semver"
      },
      {
        "version": "20.0.0",
        "status": "unaffected",
        "lessThan": "20.0.0",
        "versionType": "semver"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.2%