7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
8.4 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
22.2%
A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | nodejs | <ย 18.13.0+dfsg1-1 | nodejs_18.13.0+dfsg1-1_all.deb |
Debian | 11 | all | nodejs | <ย 12.22.12~dfsg-1~deb11u4 | nodejs_12.22.12~dfsg-1~deb11u4_all.deb |
Debian | 10 | all | nodejs | <ย 10.24.0~dfsg-1~deb10u1 | nodejs_10.24.0~dfsg-1~deb10u1_all.deb |
Debian | 999 | all | nodejs | <ย 20.15.0+dfsg-1 | nodejs_20.15.0+dfsg-1_all.deb |
Debian | 13 | all | nodejs | <ย 20.14.0+dfsg-3 | nodejs_20.14.0+dfsg-3_all.deb |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
8.4 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
22.2%