Vulnerability Description
`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nodejs | Node.Js | >= 20.0.0, <= 20.5.0 |
| Fedoraproject | Fedora | 37 |
Related Weaknesses (CWE)
References
- https://hackerone.com/reports/2037887Issue Tracking
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20230915-0009/Third Party Advisory
- https://hackerone.com/reports/2037887Issue Tracking
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20230915-0009/Third Party Advisory
FAQ
What is CVE-2023-32003?
CVE-2023-32003 is a vulnerability with a CVSS score of 5.3 (MEDIUM). `fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a ...
How severe is CVE-2023-32003?
CVE-2023-32003 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-32003?
Check the references section above for vendor advisories and patch information. Affected products include: Nodejs Node.Js, Fedoraproject Fedora.