CVE-2024-21892
nodejs: code injection and privilege escalation through Linux capabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.
Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.
This allows unprivileged users to inject code that inherits the process's elevated privileges.
En Linux, Node.js ignora ciertas variables de entorno si pueden haber sido configuradas por un usuario sin privilegios mientras el proceso se ejecuta con privilegios elevados con la única excepción de CAP_NET_BIND_SERVICE. Debido a un error en la implementación de esta excepción, Node.js aplica incorrectamente esta excepción incluso cuando se han configurado otras capacidades. Esto permite a los usuarios sin privilegios inyectar código que hereda los privilegios elevados del proceso.
A flaw was found in Node.js. On Linux, Node.js ignores certain environment variables if an unprivileged user has set them while the process is running with elevated privileges, except for CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when other capabilities have been set. This flaw allows unprivileged users to inject code that inherits the process's elevated privileges.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-01-03 CVE Reserved
- 2024-02-20 CVE Published
- 2024-05-02 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2024/03/11/1 | ||
https://hackerone.com/reports/2237545 | ||
https://security.netapp.com/advisory/ntap-20240322-0003 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-21892 | 2024-04-22 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2264582 | 2024-04-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Node.js Search vendor "Node.js" | Node.js Search vendor "Node.js" for product "Node.js" | 21.6.0 Search vendor "Node.js" for product "Node.js" and version "21.6.0" | en |
Affected
| ||||||
Node.js Search vendor "Node.js" | Node.js Search vendor "Node.js" for product "Node.js" | 20.11.0 Search vendor "Node.js" for product "Node.js" and version "20.11.0" | en |
Affected
| ||||||
Node.js Search vendor "Node.js" | Node.js Search vendor "Node.js" for product "Node.js" | 18.19.0 Search vendor "Node.js" for product "Node.js" and version "18.19.0" | en |
Affected
|