First published: Tue Sep 12 2023(Updated: )
Node.js could allow a remote attacker to obtain sensitive information, caused by the failure to restrict file stats through the fs.statfs API in the permission model. By using the --allow-fs-read flag with a non-* argument, an attacker could exploit this vulnerability to retrieve stats from files that they do not have explicit read access to.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nodejs Node.js | >=20.0.0<20.5.1 | |
Nodejs Node.js | >=20.0.0<=20.6.1 | |
<=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-32005.
Node.js version 20 is affected.
The severity level of CVE-2023-32005 is medium with a score of 5.3.
This vulnerability affects users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument.
To fix the vulnerability in Node.js version 20, you should update to a version higher than 20.6.1.