First published: Tue Feb 20 2024(Updated: )
Node.js could allow a remote attacker to bypass security restrictions, caused by the improper handling of wildcards in --allow-fs-read and --allow-fs-write. An attacker could exploit this vulnerability to gain access to the system.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <20.11.1 | 20.11.1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 | |
Node.js | >=20.0.0<20.11.1 | |
Node.js | >=21.0.0<21.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21890 has been rated as a high severity vulnerability due to its potential to allow remote attackers to bypass security restrictions.
To fix CVE-2024-21890, update Node.js to version 20.11.1 or apply the relevant patches from IBM for Cognos Analytics.
CVE-2024-21890 affects versions of Node.js prior to 20.11.1.
CVE-2024-21890 can be exploited by remote attackers to gain unauthorized access to the system due to improper handling of wildcards.
The Node.js Permission Model lacks clear documentation regarding the handling of permission flags, which is part of the problem outlined in CVE-2024-21890.