Severity
7.8HIGH
EPSS
0.4%
top 36.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 20
Latest updateApr 15

Description

On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set. This allows unprivileged users to inject code that inherits the process's elevated privileges.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5nodejs/node4.04.*+17
NVDnodejs/node.js18.0.018.19.1+2
Debiannodejs< 18.20.4+dfsg-1~deb12u1+2

🔴Vulnerability Details

3
CVEList
CVE-2024-21892: On Linux, Node2024-02-20
OSV
CVE-2024-21892: On Linux, Node2024-02-20
GHSA
GHSA-f27j-4f6g-jp27: On Linux, Node2024-02-20

📋Vendor Advisories

4
Oracle
Oracle Oracle Java SE Risk Matrix: Node (Node.js) — CVE-2024-218922024-04-15
Red Hat
nodejs: code injection and privilege escalation through Linux capabilities2024-02-16
Microsoft
On Linux Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_2024-02-13
Debian
CVE-2024-21892: nodejs - On Linux, Node.js ignores certain environment variables if those may have been s...2024
CVE-2024-21892 (HIGH CVSS 7.8) | cvebase.io