Permission model improperly protects against path traversal in Node.js 20
Team Summary
Official summary from Internet Bug Bounty
Permission model improperly protects against path traversal (High) - (CVE-2023-39331) A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Impacts: This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE is issued, the permission model is an experimental feature of Node.js. Thanks to Tobias Nießen who reported and created the security patch. Full Security Advisory: https://nodejs.org/en/blog/vulnerability/october-2023-security-releases
Vulnerability Details
Technical details and impact analysis
Related CVEs
Associated Common Vulnerabilities and Exposures
A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of path traversal bypass when verifying file permissions. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$2330.00
Submitted
Weakness
Path Traversal