Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-21298
HistoryFeb 26, 2021 - 4:25 p.m.

CVE-2021-21298 Path traversal in Node-Red

2021-02-2616:25:14
CWE-22
GitHub_M
www.cve.org

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

39.7%

Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier has a vulnerability which allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with projects.read permission is able to access any file via the Projects API. The issue has been patched in Node-RED 1.2.8. The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. The primary workaround is not give untrusted users read access to the Node-RED editor.

CNA Affected

[
  {
    "product": "node-red",
    "vendor": "node-red",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.2.8"
      }
    ]
  }
]

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

39.7%

Related for CVELIST:CVE-2021-21298