This vulnerability allows arbitrary path traversal via the Projects API.
If the Projects feature is enabled, a user with projects.read
permission is able to access any file via the Projects API.
The issue has been patched in Node-RED 1.2.8
The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED.
The primary workaround is not give untrusted users read access to the Node-RED editor.
If you have any questions or comments about this advisory: * Email us at team@nodered.org
Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
{ "nvd_published_at": "2021-02-26T17:15:00Z", "cwe_ids": [ "CWE-22" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2021-02-26T16:23:34Z" }