Path Traversal Affecting node package, versions [20.0.0,20.11.1) [21.0.0,21.6.2)
Snyk CVSS
Attack Complexity
High
Confidentiality
High
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.05% (15th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UPSTREAM-NODE-6252334
- published 18 Feb 2024
- disclosed 13 Feb 2024
- credit Tobias Nießen
Introduced: 13 Feb 2024
CVE-2024-21896 Open this link in a new tabHow to fix?
Upgrade node
to version 20.11.1, 21.6.2 or higher.
Overview
node is a JavaScript runtime built on Chrome's V8 JavaScript engine.
Affected versions of this package are vulnerable to Path Traversal by monkeypatching Buffer.prototype.utf8Write
in Buffer.from()
, which is invoked by path.resolve()
in resolving paths which are treated as buffers.
Note: The vulnerable permission model feature is experimental at the time of this vulnerability's discovery.