Lucene search

K

5 matches found

CVE
CVE
added 2024/02/20 2:15 a.m.264 views

CVE-2024-21890

The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: --allow-fs-read=/home/node/.ssh/*.pub will ignore pub and give access to everything after .ssh/. This misleading documentation affects all users u...

6.5CVSS4.7AI score0.00383EPSS
CVE
CVE
added 2024/02/20 2:15 a.m.221 views

CVE-2024-21892

On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.Due to a bug in the implementation of this exception, Node.js incorrectly applies this exc...

7.8CVSS7.3AI score0.00153EPSS
CVE
CVE
added 2024/02/20 2:15 a.m.185 views

CVE-2024-22019

A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk ...

7.5CVSS7.2AI score0.00057EPSS
CVE
CVE
added 2024/02/20 2:15 a.m.135 views

CVE-2024-21896

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, na...

9.8CVSS7AI score0.00386EPSS
CVE
CVE
added 2024/02/20 2:15 a.m.134 views

CVE-2024-21891

Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack.This vulnerability affects all users using the experimental ...

8.8CVSS7.4AI score0.00062EPSS