NodeBB is Node.js based forum software. Starting in version 2.5.0 and prior to version 2.8.7, due to the use of the object destructuring assignment syntax in the user export code path, combined with a path traversal vulnerability, a specially crafted payload could invoke the user export logic to arbitrarily execute javascript files on the local disk. This issue is patched in version 2.8.7. As a workaround, site maintainers can cherry pick the fix into their codebase to patch the exploit.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2151 NodeBB is Node.js based forum software. Starting in version 2.5.0 and prior to version 2.8.7, due to the use of the object destructuring assignment syntax in the user export code path, combined with a path traversal vulnerability, a specially crafted payload could invoke the user export logic to arbitrarily execute javascript files on the local disk. This issue is patched in version 2.8.7. As a workaround, site maintainers can cherry pick the fix into their codebase to patch the exploit.
Github GHSA Github GHSA GHSA-vh2g-6c4x-5hmp Path traversal and code execution via prototype vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nodebb:nodebb:*:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-13T16:44:43.667Z

Reserved: 2023-02-17T22:44:03.149Z

Link: CVE-2023-26045

cve-icon Vulnrichment

Updated: 2024-08-02T11:39:06.562Z

cve-icon NVD

Status : Modified

Published: 2023-07-24T22:15:10.033

Modified: 2024-11-21T07:50:39.100

Link: CVE-2023-26045

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.