First published: Fri Feb 16 2024(Updated: )
Node.js could allow a local authenticated attacker to gain elevated privileges on the system, caused by a bug in the implementation of the exception of CAP_NET_BIND_SERVICE. An attacker could exploit this vulnerability to inject code that inherits the process's elevated privileges.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/node | <18.19.1 | 18.19.1 |
redhat/node | <20.11.1 | 20.11.1 |
redhat/node | <21.6.2 | 21.6.2 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 | |
All of | ||
Any of | ||
Node.js | >=18.0.0<18.19.1 | |
Node.js | >=20.0.0<20.11.1 | |
Node.js | >=21.0.0<21.6.2 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21892 is classified as a high severity vulnerability due to its potential to allow local authenticated attackers to gain elevated privileges.
To mitigate CVE-2024-21892, update Node.js to versions 18.19.1, 20.11.1, or 21.6.2, or apply the appropriate patches for affected IBM Cognos Analytics releases.
CVE-2024-21892 affects users running specific versions of Node.js and IBM Cognos Analytics on Linux systems.
CVE-2024-21892 exploits a bug in the implementation of the exception of CAP_NET_BIND_SERVICE in Node.js on Linux.
If exploited, CVE-2024-21892 could allow attackers to inject code that inherits elevated privileges from the Node.js process.