Lucene search

K

Node.js Security Vulnerabilities

cve
cve

CVE-2024-27982

The team has identified a critical vulnerability in the http server of the most recent version of Node, where malformed headers can lead to HTTP request smuggling. Specifically, if a space is placed before a content-length header, it is not interpreted correctly, enabling attackers to smuggle in a....

6.5CVSS

6.4AI Score

0.0004EPSS

2024-05-07 05:15 PM
37
cve
cve

CVE-2024-21892

On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this...

7.5CVSS

7.2AI Score

0.0004EPSS

2024-02-20 02:15 AM
127
cve
cve

CVE-2024-21891

Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users using the...

7.9CVSS

7.1AI Score

0.0004EPSS

2024-02-20 02:15 AM
78
cve
cve

CVE-2024-27983

An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a...

8.2CVSS

6.8AI Score

0.0004EPSS

2024-04-09 01:15 AM
46
cve
cve

CVE-2024-22017

setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid(). This vulnerability affects all users using version...

7.3CVSS

6.9AI Score

0.0004EPSS

2024-03-19 05:15 AM
54
cve
cve

CVE-2024-22019

A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk....

7.5CVSS

7AI Score

0.0004EPSS

2024-02-20 02:15 AM
106
cve
cve

CVE-2024-21896

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals,...

7.9CVSS

6.9AI Score

0.0004EPSS

2024-02-20 02:15 AM
59
cve
cve

CVE-2024-21890

The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: --allow-fs-read=/home/node/.ssh/*.pub will ignore pub and give access to everything after .ssh/. This misleading documentation affects all users.....

5CVSS

7AI Score

0.0004EPSS

2024-02-20 02:15 AM
73
cve
cve

CVE-2024-22025

A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli,...

6.5CVSS

6.8AI Score

0.0004EPSS

2024-03-19 05:15 AM
54
cve
cve

CVE-2023-30590

The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivateKey(). However,...

7.5CVSS

7.5AI Score

0.001EPSS

2023-11-28 08:15 PM
371
cve
cve

CVE-2024-3566

A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are...

7.8AI Score

0.0004EPSS

2024-04-10 04:15 PM
31
cve
cve

CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users....

7.5CVSS

7.2AI Score

0.002EPSS

2023-10-18 04:15 AM
363
cve
cve

CVE-2023-32005

A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.statfs API. As a...

5.3CVSS

6.6AI Score

0.001EPSS

2023-09-12 02:15 AM
48
cve
cve

CVE-2023-30589

The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only....

7.5CVSS

7.4AI Score

0.001EPSS

2023-07-01 12:15 AM
222
cve
cve

CVE-2023-30581

The use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the...

7.5CVSS

7.4AI Score

0.001EPSS

2023-11-23 12:15 AM
176
cve
cve

CVE-2023-30588

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key...

5.3CVSS

7.2AI Score

0.001EPSS

2023-11-28 08:15 PM
215
cve
cve

CVE-2023-32558

The use of the deprecated API process.binding() can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature...

7.5CVSS

8.3AI Score

0.001EPSS

2023-09-12 02:15 AM
151
cve
cve

CVE-2023-30585

A vulnerability has been identified in the Node.js (.msi version) installation process, specifically affecting Windows users who install Node.js using the .msi installer. This vulnerability emerges during the repair operation, where the "msiexec.exe" process, running under the NT AUTHORITY\SYSTEM.....

7.5CVSS

7.3AI Score

0.001EPSS

2023-11-28 02:15 AM
165
cve
cve

CVE-2023-39331

A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations....

7.7CVSS

7.3AI Score

0.001EPSS

2023-10-18 04:15 AM
475
cve
cve

CVE-2023-39332

Various node:fs functions allow specifying paths as either strings or Uint8Array objects. In Node.js environments, the Buffer class extends the Uint8Array class. Node.js prevents path traversal through strings (see CVE-2023-30584) and Buffer objects (see CVE-2023-32004), but not through non-Buffer....

9.8CVSS

8.1AI Score

0.001EPSS

2023-10-18 04:15 AM
480
cve
cve

CVE-2023-30586

A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass....

7.5CVSS

7.5AI Score

0.001EPSS

2023-07-01 12:15 AM
157
cve
cve

CVE-2023-32559

A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of...

7.5CVSS

8.6AI Score

0.001EPSS

2023-08-24 02:15 AM
2560
cve
cve

CVE-2023-32003

fs.mkdtemp() and fs.mkdtempSync() can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects all users using the...

5.3CVSS

6.9AI Score

0.001EPSS

2023-08-15 04:15 PM
356
cve
cve

CVE-2023-32006

The use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x. Please note...

8.8CVSS

9AI Score

0.001EPSS

2023-08-15 04:15 PM
409
cve
cve

CVE-2023-32002

The use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note that at the time this.....

9.8CVSS

9.2AI Score

0.001EPSS

2023-08-21 05:15 PM
376
cve
cve

CVE-2023-32004

A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of Buffers in file system APIs causing a traversal path to bypass when verifying file permissions. This vulnerability affects all users using the....

8.8CVSS

8.8AI Score

0.001EPSS

2023-08-15 04:15 PM
373