Lucene search

K
cvelistHackeroneCVELIST:CVE-2024-36138
HistorySep 07, 2024 - 4:00 p.m.

CVE-2024-36138

2024-09-0716:00:36
hackerone
www.cve.org
6
cve-2024-36138
bypass
improper handling
windows
child process
code execution

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.5%

Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "vendor": "nodejs",
    "product": "node",
    "versions": [
      {
        "version": "18.20.3",
        "status": "affected",
        "lessThanOrEqual": "18.20.3",
        "versionType": "semver"
      },
      {
        "version": "20.15.0",
        "status": "affected",
        "lessThanOrEqual": "20.15.0",
        "versionType": "semver"
      },
      {
        "version": "22.4.0",
        "status": "affected",
        "lessThanOrEqual": "22.4.0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.5%