
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. The flaw (CVE-2023-30584) relates to improper handling of path traversal bypass when verifying file permissions. This vulnerability affects all users using the experimental permission model in Node.js 20 and was disclosed in June 2023 (Node.js Blog).
The vulnerability is classified with a CVSS v3.1 Base Score of 7.5, indicating a high severity issue. The vulnerability is characterized by Network attack vector, Low attack complexity, requiring No privileges, and No user interaction. The scope is Unchanged, with No impact on confidentiality, High impact on integrity, and No impact on availability (Red Hat Portal). The vulnerability is categorized under CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').
When successfully exploited, this vulnerability could lead to path traversal bypass when verifying file permissions, potentially allowing attackers to bypass security restrictions and access or modify files outside of intended boundaries (Node.js Blog).
The vulnerability has been addressed in Node.js security updates. Users are advised to upgrade to patched versions of Node.js. It's worth noting that this vulnerability only affects users who are using the experimental permission model feature (Node.js Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."