VYPR

Bitnami package

node

pkg:bitnami/node

Vulnerabilities (107)

  • CVE-2024-22017HigMar 19, 2024
    affected >= 20.0.0, < 20.11.1fixed 20.11.1

    setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid(). This vulnerability affects all users us

  • CVE-2024-21896Feb 20, 2024
    affected >= 20.0.0, < 20.12.0fixed 20.12.0

    The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching B

  • CVE-2024-21890Feb 20, 2024
    affected >= 20.0.0, < 20.11.1fixed 20.11.1

    The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: ``` --allow-fs-read=/home/node/.ssh/*.pub ``` will ignore `pub` and give access to everything after `.ssh/`. This misleading

  • CVE-2024-21891Feb 20, 2024
    affected >= 20.0.0, < 20.11.1fixed 20.11.1

    Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users usi

  • CVE-2024-22019Feb 20, 2024
    affected < 18.19.1fixed 18.19.1

    A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of li

  • CVE-2024-21892Feb 20, 2024
    affected < 18.19.1fixed 18.19.1

    On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrec

  • CVE-2023-30590Nov 28, 2023
    affected >= 16.0.0, < 16.20.1fixed 16.20.1

    The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivat

  • CVE-2023-30588Nov 28, 2023
    affected >= 16.0.0, < 16.20.1fixed 16.20.1

    When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when acces

  • CVE-2023-30585Nov 28, 2023
    affected >= 16.0.0, < 16.20.1fixed 16.20.1

    A vulnerability has been identified in the Node.js (.msi version) installation process, specifically affecting Windows users who install Node.js using the .msi installer. This vulnerability emerges during the repair operation, where the "msiexec.exe" process, running under the NT

  • CVE-2023-30581Nov 22, 2023
    affected >= 16.0.0, < 16.20.1fixed 16.20.1

    The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20.

  • CVE-2023-39331Oct 18, 2023
    affected >= 20.0.0, < 20.8.1fixed 20.8.1

    A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined impl

  • CVE-2023-38552Oct 18, 2023
    affected < 18.18.2fixed 18.18.2

    When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability

  • CVE-2023-39332Oct 18, 2023
    affected >= 20.0.0, < 20.8.0fixed 20.8.0

    Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004)

  • CVE-2023-44487HigKEVOct 10, 2023
    affected < 18.18.2fixed 18.18.2

    The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • CVE-2023-32558Sep 12, 2023
    affected >= 20.0.0, < 20.5.1fixed 20.5.1

    The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an

  • CVE-2023-32005Sep 12, 2023
    affected >= 20.0.0, < 20.5.1fixed 20.5.1

    A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument. This flaw arises from an inadequate permission model that fails to restrict file stats through the `fs.sta

  • CVE-2023-32559Aug 24, 2023
    affected < 16.20.2fixed 16.20.2

    A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `pr

  • CVE-2023-32002Aug 21, 2023
    affected < 16.20.2fixed 16.20.2

    The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note

  • CVE-2023-32003Aug 15, 2023
    affected >= 20.0.0, < 20.5.1fixed 20.5.1

    `fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects

  • CVE-2023-32004Aug 15, 2023
    affected >= 20.0.0, < 20.5.1fixed 20.5.1

    A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of Buffers in file system APIs causing a traversal path to bypass when verifying file permissions. This vulnerability affects

Page 3 of 6