CVE-2024-21896
Severity
9.8CRITICAL
EPSS
1.6%
top 18.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 20
Description
The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.
This vulnerability affects all users using the experimental per…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
3CVEList▶
CVE-2024-21896: The permission model protects itself against path traversal attacks by calling path↗2024-02-20
OSV▶
CVE-2024-21896: The permission model protects itself against path traversal attacks by calling path↗2024-02-20
GHSA▶
GHSA-3q5r-g7hx-jv3c: The permission model protects itself against path traversal attacks by calling path↗2024-02-20
📋Vendor Advisories
3Microsoft▶
The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer the implementation uses Buffer.fr↗2024-02-13
Debian▶
CVE-2024-21896: nodejs - The permission model protects itself against path traversal attacks by calling p...↗2024