CVE-2024-22018
nodejs: fs.lstat bypasses permission model
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used.
This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.
This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Se ha identificado una vulnerabilidad en Node.js que afecta a los usuarios del modelo de permisos experimental cuando se utiliza el indicador --allow-fs-read. Este fallo surge de un modelo de permisos inadecuado que no logra restringir las estadísticas de archivos a través de la API fs.lstat. Como resultado, los actores malintencionados pueden recuperar estadísticas de archivos a los que no tienen acceso de lectura explícito. Esta vulnerabilidad afecta a todos los usuarios que utilizan el modelo de permiso experimental en Node.js 20 y Node.js 21. Tenga en cuenta que en el momento en que se emitió este CVE, el modelo de permiso es una característica experimental de Node.js.
A flaw was found in the Node.js package. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files they do not have explicit read access to.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-01-04 CVE Reserved
- 2024-07-10 CVE Published
- 2024-07-20 EPSS Updated
- 2024-11-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2024/07/11/6 | ||
http://www.openwall.com/lists/oss-security/2024/07/19/3 | ||
https://hackerone.com/reports/2145862 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-22018 | 2024-08-26 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2296990 | 2024-08-26 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Node.js Search vendor "Node.js" | Node.js Search vendor "Node.js" for product "Node.js" | 20.11.0 Search vendor "Node.js" for product "Node.js" and version "20.11.0" | en |
Affected
| ||||||
Node.js Search vendor "Node.js" | Node.js Search vendor "Node.js" for product "Node.js" | 21.6.1 Search vendor "Node.js" for product "Node.js" and version "21.6.1" | en |
Affected
|