Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-39331
HistoryOct 18, 2023 - 4:15 a.m.

CVE-2023-39331

2023-10-1804:15:11
Debian Security Bug Tracker
security-tracker.debian.org
11
cve-2023-39331
vulnerability
node.js
path traversal
patch
commit
permission model
experimental
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.2%

A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.2%