UBUNTU-CVE-2024-21891

Source
https://ubuntu.com/security/CVE-2024-21891
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-21891.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-21891
Related
Published
2024-02-20T02:15:00Z
Modified
2025-02-14T16:33:01Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

References

Affected packages

Ubuntu:24.10 / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@20.16.0+dfsg-1ubuntu1?arch=source&distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

18.*

18.19.1+dfsg-6ubuntu5
18.20.1+dfsg-4ubuntu4

20.*

20.13.1+dfsg-2ubuntu6
20.14.0+dfsg-1ubuntu1
20.14.0+dfsg-2ubuntu1
20.14.0+dfsg-3ubuntu1
20.15.0+dfsg-1ubuntu3
20.16.0+dfsg-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}