ADVISORY!

TLP : CLEAR

Date : 09/07/2024

REF NO : CERT / 2024/07/61

Node.js Multiple Vulnerabilities

Severity Level: Medium

Components Affected

  • Node.js versions prior to 18.20.4 (LTS)
  • Node.js versions prior to 20.15.1 (LTS)
  • Node.js versions prior to 22.4.1 (Current)

Overview

Multiple vulnerabilities have been identified in Node.js. A remote attacker can exploit these vulnerabilities to trigger remote code execution and security restriction bypass on the targeted system.

Description

Two vulnerabilities have been identified in Node.js, both of which affect users employing specific experimental features. The first vulnerability involves the experimental permission model, particularly when the --allow-fs-read flag is used. This flaw allows malicious actors to retrieve file stats via the fs.lstat API, even for files they do not have explicit read access to, thereby compromising the intended file access restrictions. This issue impacts users of Node.js versions 20 and 21. The second vulnerability allows the bypassing of network import restrictions by embedding non-network imports within data URLs, enabling attackers to execute arbitrary code. This flaw poses significant security risks to developers and servers, as it can be exploited to violate network import security. To mitigate this issue, data URLs in network imports are now forbidden.

Impact

  • Remote Code Execution
  • Security Restriction Bypass

Solution/ Workarounds

Before installation of the software, please visit the vendor web-site for more details.

  • Update to Node.js version 18.20.4 (LTS)
  • Update to Node.js version 20.15.1 (LTS) 
  • Update to Node.js version 22.4.1 (Current)

Reference

Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.

Sri Lanka Computer Emergency Readiness Team | Coordination Centre

Copyright © 2023 SRI LANKA CERT | CC