Lucene search

K
osvGoogleOSV:BIT-NODE-2023-39331
HistoryMar 06, 2024 - 10:59 a.m.

BIT-node-2023-39331

2024-03-0610:59:16
Google
osv.dev
7
vulnerability patch
path traversal
utility functions
user-defined implementations
experimental feature
node.js

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.2%

A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations.Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CPENameOperatorVersion
nodege20.0.0
nodelt20.8.1

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.2%