`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory.
This vulnerability affects all users using the experimental permission model in Node.js 20.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: hackerone
Published: 2023-08-15T15:10:29.363Z
Updated: 2024-10-09T14:16:32.217Z
Reserved: 2023-05-01T01:00:12.220Z
Link: CVE-2023-32003
Vulnrichment
Updated: 2024-08-02T15:03:28.792Z
NVD
Status : Analyzed
Published: 2023-08-15T16:15:10.970
Modified: 2023-09-21T19:38:19.270
Link: CVE-2023-32003
Redhat