
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument. This flaw arises from an inadequate permission model that fails to restrict file watching through the fs.watchFile API. As a result, malicious actors can monitor files that they do not have explicit read access to (Node Blog).
The vulnerability is classified as medium severity with a CVSS v3.1 base score of 5.3 (Network Vector, Low Attack Complexity, No Privileges Required, No User Interaction, Unchanged Scope, Low Confidentiality Impact, No Integrity Impact, No Availability Impact) (Red Hat). The issue specifically affects the experimental permission model in Node.js 20.x versions prior to 20.3.1 (Node Blog).
When exploited, this vulnerability allows malicious actors to monitor files that they do not have explicit read access to, potentially leading to unauthorized access to sensitive file information (Node Blog).
The vulnerability has been fixed in Node.js version 20.3.1. Users are advised to upgrade to this version or later to address the security issue (Node Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."