TLP : CLEAR
Date : 09/07/2024
REF NO : CERT / 2024/07/61
Severity Level: Medium
Components Affected
Overview
Multiple vulnerabilities have been identified in Node.js. A remote attacker can exploit these vulnerabilities to trigger remote code execution and security restriction bypass on the targeted system.
Description
--allow-fs-read
flag is used. This flaw allows malicious actors to retrieve file stats via the fs.lstat
API, even for files they do not have explicit read access to, thereby compromising the intended file access restrictions. This issue impacts users of Node.js versions 20 and 21. The second vulnerability allows the bypassing of network import restrictions by embedding non-network imports within data URLs, enabling attackers to execute arbitrary code. This flaw poses significant security risks to developers and servers, as it can be exploited to violate network import security. To mitigate this issue, data URLs in network imports are now forbidden.Impact
Solution/ Workarounds
Before installation of the software, please visit the vendor web-site for more details.
Reference
Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.
Sri Lanka Computer Emergency Readiness Team | Coordination Centre