First published: Tue Jul 09 2024(Updated: )
A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports. Exploiting this flaw can violate network import security, posing a risk to developers and servers.
Affected Software | Affected Version | How to fix |
---|---|---|
Node.js |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2296417 is considered critical due to the potential for arbitrary code execution.
To fix REDHAT-BUG-2296417, it is recommended to update Node.js to the latest version where the vulnerability is patched.
REDHAT-BUG-2296417 has been verified on various platforms using Node.js.
REDHAT-BUG-2296417 allows an attacker to execute arbitrary code through embedded non-network imports in data URLs.
Mitigation for REDHAT-BUG-2296417 is achieved by forbidding the use of data URLs in network imports.