First published: Tue Feb 20 2024(Updated: )
Node.js could allow a remote attacker to bypass security restrictions, caused by improper path traversal sequence sanitization. By using a path traversal attack, an attacker could exploit this vulnerability leading to filesystem permission model bypass.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <20.11.1 | 20.11.1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 | |
Node.js | >=20.0.0<20.11.1 | |
Node.js | >=21.0.0<21.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21891 is classified as a high severity vulnerability due to its potential to allow remote attackers to bypass security restrictions.
To mitigate CVE-2024-21891, update Node.js to version 20.11.1 or apply the relevant patches for IBM Cognos Analytics.
CVE-2024-21891 can be exploited through path traversal attacks, allowing unauthorized access to files in the system.
CVE-2024-21891 affects Node.js and specific versions of IBM Cognos Analytics.
The impact of CVE-2024-21891 includes potential unauthorized access to the filesystem, compromising the security of the application.