CVE-2023-32003

CWE-22Path Traversal6 documents6 sources
Severity
5.3MEDIUM
EPSS
0.1%
top 80.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 15

Description

`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

CVEListV5nodejs/node4.04.*+14
NVDnodejs/node.js20.0.020.5.0

Also affects: Fedora 37, 38

🔴Vulnerability Details

2
CVEList
CVE-2023-32003: `fs2023-08-15
GHSA
GHSA-r874-ffh8-2fvj: `fs2023-08-15

📋Vendor Advisories

3
Red Hat
nodejs: fs.mkdtemp() and fs.mkdtempSync() are missing getValidatedPath() checks2023-08-09
Microsoft
`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a 2023-08-08
Debian
CVE-2023-32003: nodejs - `fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model...2023
CVE-2023-32003 (MEDIUM CVSS 5.3) | `fs.mkdtemp()` and `fs.mkdtempSync( | cvebase.io