• CVE-2024-21896

发布时间: 2024年2月26日

修改时间: 2024年2月26日

概要

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS v3 指标

NVD openEuler
CVSS评分 7.9 7.0
Attack Vector Local Local
Attack Complexity Low High
Privileges Required Low Low
User Interaction Required None
Scope Changed Unchanged
Confidentiality High High
Integrity High High
Availability None High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-1450 The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js. 2024年2月26日

影响产品

产品 状态
KY3.4-4A nodejs Unaffected
KY3.4-5 nodejs Unaffected
KY3.5.1 nodejs Unaffected
KY3.5.2 nodejs Unaffected