`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
History

Wed, 09 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published: 2023-08-15T15:10:29.363Z

Updated: 2024-10-09T14:16:32.217Z

Reserved: 2023-05-01T01:00:12.220Z

Link: CVE-2023-32003

cve-icon Vulnrichment

Updated: 2024-08-02T15:03:28.792Z

cve-icon NVD

Status : Analyzed

Published: 2023-08-15T16:15:10.970

Modified: 2023-09-21T19:38:19.270

Link: CVE-2023-32003

cve-icon Redhat

Severity : Low

Publid Date: 2023-08-09T00:00:00Z

Links: CVE-2023-32003 - Bugzilla