First published: Mon Oct 16 2023(Updated: )
A previously disclosed vulnerability (<a href="https://access.redhat.com/security/cve/CVE-2023-30584">CVE-2023-30584</a>) was patched insufficiently. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. References: <a href="https://nodejs.org/en/blog/vulnerability/october-2023-security-releases">https://nodejs.org/en/blog/vulnerability/october-2023-security-releases</a>
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cognos Analytics | <=12.0.0-12.0.2 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 | |
Node.js | >=20.0.0<20.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39331 is a path traversal vulnerability in Node.js.
The severity of CVE-2023-39331 is high, with a CVSS score of 7.7.
CVE-2023-39331 arises due to insufficient patching of a previously disclosed vulnerability (CVE-2023-30584) in commit 205f1e6 of Node.js.
Node.js versions up to and excluding 20.8.0 are affected by CVE-2023-39331.
Yes, the vulnerability can be fixed by applying the necessary patches and updates provided by the Node.js project.