First published: Wed Jul 10 2024(Updated: )
A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Planning Analytics | <=2.1 | |
IBM Planning Analytics | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-22018 is categorized as medium due to its impact on the file permission model.
To fix CVE-2024-22018, users should avoid using the --allow-fs-read flag in Node.js or update to a patched version that addresses the vulnerability.
CVE-2024-22018 specifically affects users of Node.js who utilize the experimental permission model and the --allow-fs-read flag.
CVE-2024-22018 impacts the fs.lstat API, allowing unauthorized access to file statistics.
A workaround for CVE-2024-22018 is to refrain from using the experimental permission model features until a fix is applied.