CVE-2023-39331
Description
A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
CWE
- (none)
Affected
- NodeJS / Node — v=4.0 <4.* [affected]; v=5.0 <5.* [affected]; v=6.0 <6.* [affected]; v=7.0 <7.* [affected]; v=8.0 <8.* [affected]; v=9.0 <9.* [affected]; v=10.0 <10.* [affected]; v=11.0 <11.* [affected]; v=12.0 <12.* [affected]; v=13.0 <13.* [affected]; v=14.0 <14.* [affected]; v=15.0 <15.* [affected]; v=16.0 <16.* [affected]; v=17.0 <17.* [affected]; v=19.0 <19.* [affected]; v=20.0 <20.8.1 [affected]
CVSS
- 3.0 score=7.7 severity=HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
References
Source
cvelistV5-main/cves/2023/39xxx/CVE-2023-39331.json