Bug 2230951 (CVE-2023-32004) - CVE-2023-32004 nodejs: Permission model bypass by specifying a path traversal sequence in a Buffer
Summary: CVE-2023-32004 nodejs: Permission model bypass by specifying a path traversal...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2023-32004
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2233379
Blocks: 2230962
TreeView+ depends on / blocked
 
Reported: 2023-08-10 09:59 UTC by Mauro Matteo Cascella
Modified: 2023-08-23 15:10 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in NodeJS. This security issue occurs as improper handling of buffers in file system APIs, causing a traversal path to bypass when verifying file permissions.
Clone Of:
Environment:
Last Closed: 2023-08-10 15:00:50 UTC
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2023-08-10 09:59:20 UTC
A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of Buffers in file system APIs causing a traversal path to bypass when verifying file permissions. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js. This vulnerability affects all users using the experimental permission model in Node.js 20.

Security Advisory:
https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permission-model-bypass-by-specifying-a-path-traversal-sequence-in-a-buffer-highcve-2023-32004

Comment 1 Product Security DevOps Team 2023-08-10 15:00:49 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-32004

Comment 2 Sandipan Roy 2023-08-22 07:06:33 UTC
Created nodejs20 tracking bugs for this issue:

Affects: fedora-38 [bug 2233379]


Note You need to log in before you can comment on or make changes to this bug.