First published: Thu Dec 21 2023(Updated: )
fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the `--allow-fs-read` flag in Node.js 20. This flaw arises from a missing check in the `fs.openAsBlob()` API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Planning Analytics Cloud | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30583 has a moderate severity due to the potential for unauthorized access to file system data.
To fix CVE-2023-30583, ensure that you are using a version of Node.js that is updated to include the necessary checks in the fs.openAsBlob() API.
CVE-2023-30583 affects IBM Planning Analytics version 2.0 and earlier.
CVE-2023-30583 is caused by a missing check in the fs.openAsBlob() API that allows bypassing the file system read restriction.
Yes, CVE-2023-30583 is a vulnerability within the Node.js environment related to the file system permission model.