Nodejs Node vulnerabilities

97 known vulnerabilities affecting nodejs/node.

Total CVEs
97
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL9HIGH50MEDIUM32LOW6

Vulnerabilities

Page 3 of 5
CVE-2024-21896CRITICALCVSS 9.8≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2024-02-20
CVE-2024-21896 [CRITICAL] CWE-27 CVE-2024-21896: The permission model protects itself against path traversal attacks by calling path.resolve() on any The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application c
cvelistv5nvd
CVE-2024-21892HIGHCVSS 7.8≥ 4.0, < 4.*≥ 5.0, < 5.*+16 more2024-02-20
CVE-2024-21892 [HIGH] CWE-94 CVE-2024-21892: On Linux, Node.js ignores certain environment variables if those may have been set by an unprivilege On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been
cvelistv5nvd
CVE-2024-21891HIGHCVSS 8.8≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2024-02-20
CVE-2024-21891 [HIGH] CWE-22 CVE-2024-21891: Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functi Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please
cvelistv5nvd
CVE-2024-22019HIGHCVSS 7.5≥ 4.0, < 4.*≥ 5.0, < 5.*+16 more2024-02-20
CVE-2024-22019 [HIGH] CWE-404 CVE-2024-22019: A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network ba
cvelistv5nvd
CVE-2024-21890MEDIUMCVSS 6.5≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2024-02-20
CVE-2024-21890 [MEDIUM] CVE-2024-21890: The Node.js Permission Model does not clarify in the documentation that wildcards should be only use The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: ``` --allow-fs-read=/home/node/.ssh/*.pub ``` will ignore `pub` and give access to everything after `.ssh/`. This misleading documentation affects all users using the experimental permission model in Node
cvelistv5nvd
CVE-2023-30590HIGHCVSS 7.5≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2023-11-28
CVE-2023-30590 [HIGH] CVE-2023-30590: The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (o The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivateKey(). However, the documentation says this API call: "Generates private and pub
cvelistv5nvd
CVE-2023-30585HIGHCVSS 7.5≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2023-11-28
CVE-2023-30585 [HIGH] CVE-2023-30585: A vulnerability has been identified in the Node.js (.msi version) installation process, specifically A vulnerability has been identified in the Node.js (.msi version) installation process, specifically affecting Windows users who install Node.js using the .msi installer. This vulnerability emerges during the repair operation, where the "msiexec.exe" process, running under the NT AUTHORITY\SYSTEM context, attempts to read the %USERPROFILE% environment variabl
cvelistv5nvd
CVE-2023-30588MEDIUMCVSS 5.3≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2023-11-28
CVE-2023-30588 [MEDIUM] CVE-2023-30588: When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current contex
cvelistv5nvd
CVE-2023-30581HIGHCVSS 7.5≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2023-11-23
CVE-2023-30581 [HIGH] CWE-862 CVE-2023-30581: The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and r The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the time this CVE was issued, the policy is an experi
cvelistv5nvd
CVE-2023-39332HIGHCVSS 7.7≥ 4.0, < 4.*≥ 5.0, < 5.*+14 more2023-10-18
CVE-2023-39332 [HIGH] CVE-2023-39332: Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects. This is distinct from CVE-2023-3200
cvelistv5
CVE-2023-38552HIGHCVSS 7.5≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2023-10-18
CVE-2023-38552 [HIGH] CWE-345 CVE-2023-38552: When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the a When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active
cvelistv5nvd
CVE-2023-39331HIGHCVSS 7.7≥ 4.0, < 4.*≥ 5.0, < 5.*+14 more2023-10-18
CVE-2023-39331 [HIGH] CVE-2023-39331: A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6 A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission mode
cvelistv5
CVE-2023-32558HIGHCVSS 7.5≥ 4.0, < 4.*≥ 5.0, < 5.*+13 more2023-09-12
CVE-2023-32558 [HIGH] CWE-22 CVE-2023-32558: The use of the deprecated API `process.binding()` can bypass the permission model through path trave The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
cvelistv5nvd
CVE-2023-32005MEDIUMCVSS 5.3≥ 4.0, < 4.*≥ 5.0, < 5.*+13 more2023-09-12
CVE-2023-32005 [MEDIUM] CWE-732 CVE-2023-32005: A vulnerability has been identified in Node.js version 20, affecting users of the experimental permi A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument. This flaw arises from an inadequate permission model that fails to restrict file stats through the `fs.statfs` API. As a result, malicious actors can retrieve stats from files t
cvelistv5nvd
CVE-2023-32559HIGHCVSS 7.5≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2023-08-24
CVE-2023-32559 [HIGH] CWE-269 CVE-2023-32559: A privilege escalation vulnerability exists in the experimental policy mechanism in all active relea A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `process.binding('spawn_sync')` run arbitrary code, outside of the limits de
cvelistv5nvd
CVE-2023-32002CRITICALCVSS 9.8≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2023-08-21
CVE-2023-32002 [CRITICAL] CWE-288 CVE-2023-32002: The use of `Module._load()` can bypass the policy mechanism and require modules outside of the polic The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note that at the time this CVE was issued, the policy is an experimental f
cvelistv5nvd
CVE-2023-32006HIGHCVSS 8.8≥ 4.0, < 4.*≥ 5.0, < 5.*+15 more2023-08-15
CVE-2023-32006 [HIGH] CWE-693 CVE-2023-32006: The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x. Please note that at the time this CVE was issued, the policy is a
cvelistv5nvd
CVE-2023-32004HIGHCVSS 8.8≥ 4.0, < 4.*≥ 5.0, < 5.*+13 more2023-08-15
CVE-2023-32004 [HIGH] CWE-22 CVE-2023-32004: A vulnerability has been discovered in Node.js version 20, specifically within the experimental perm A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of Buffers in file system APIs causing a traversal path to bypass when verifying file permissions. This vulnerability affects all users using the experimental permission model in Node.js 20. Please n
cvelistv5nvd
CVE-2023-32003MEDIUMCVSS 5.3≥ 4.0, < 4.*≥ 5.0, < 5.*+13 more2023-08-15
CVE-2023-32003 [MEDIUM] CWE-22 CVE-2023-32003: `fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path `fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects all users using the experimental permission model in Node.js 20. Please
cvelistv5nvd
CVE-2023-30586HIGHCVSS 7.5≥ 4.0, < 4.*≥ 5.0, < 5.*+13 more2023-07-01
CVE-2023-30586 [HIGH] CWE-862 CVE-2023-30586: A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL eng A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible Ope
cvelistv5nvd
Nodejs Node vulnerabilities | cvebase