First published: Sun Jan 28 2024(Updated: )
An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor states "we dispute the report's accuracy ... the configuration does not enable remote code execution.."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Postman | <10.22 | |
macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-23738 has not been officially rated, but it potentially allows remote code execution.
To mitigate CVE-2024-23738, users should upgrade Postman to version 10.23 or later.
CVE-2024-23738 affects Postman versions 10.22 and earlier.
Yes, if exploited, CVE-2024-23738 may allow remote attackers to execute arbitrary code, potentially leading to unauthorized access.
No, CVE-2024-23738 specifically targets versions of Postman on macOS prior to 10.22, but macOS itself is not inherently vulnerable.