First published: Tue Feb 20 2024(Updated: )
Node.js could allow a remote attacker to traverse directories on the system. By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, an attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to read arbitrary files on the system.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <20.11.1 | 20.11.1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21896 has a high severity as it allows remote directory traversal, potentially exposing sensitive files.
CVE-2024-21896 affects Node.js installations and IBM Cognos Analytics versions up to 12.0.3 and 11.2.4 FP3.
To fix CVE-2024-21896, update Node.js to version 20.11.1 and apply the relevant patches for affected Cognos Analytics versions.
CVE-2024-21896 exploits directory traversal vulnerabilities through manipulated Buffer internals in Node.js.
An attacker can use CVE-2024-21896 to send crafted URL requests that read arbitrary files from the system.