
Cloud Vulnerability DB
A community-led vulnerabilities database
A cryptographic vulnerability was identified in Node.js on Linux systems in versions of 18.x prior to 18.40.0. The vulnerability relates to the default path configuration for openssl.cnf, which could potentially be accessible to non-administrative users instead of being properly restricted to /etc/ssl as it was in versions prior to the OpenSSL 3 upgrade (NVD, CVE Mitre).
When Node.js starts on Linux-based systems, it attempts to read the openssl.cnf file from /home/iojs/build/ws/out/Release/obj.target/deps/openssl/openssl.cnf. This path, which normally doesn't exist, could be exploited on shared systems where an attacker might be able to create this file and consequently affect the default OpenSSL configuration for other users (Node Blog).
On shared systems, this vulnerability could allow an attacker to manipulate the OpenSSL configuration affecting other users' Node.js applications. This could potentially lead to cryptographic weaknesses or other security issues depending on how the OpenSSL configuration is manipulated (Node Blog).
The vulnerability has been fixed in Node.js version 18.40.0 and later. Users are advised to upgrade to the patched version. For systems that cannot be immediately upgraded, administrators should ensure proper file permissions and access controls are in place for the affected paths (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."