Vulnerability Description
A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nodejs | Node.Js | >= 20.0.0, < 20.8.1 |
Related Weaknesses (CWE)
References
- https://hackerone.com/reports/2092852Third Party Advisory
- https://security.netapp.com/advisory/ntap-20231116-0009/Third Party Advisory
- https://hackerone.com/reports/2092852Third Party Advisory
- https://security.netapp.com/advisory/ntap-20231116-0009/Third Party Advisory
- https://security.netapp.com/advisory/ntap-20241108-0002/
FAQ
What is CVE-2023-39331?
CVE-2023-39331 is a vulnerability with a CVSS score of 7.5 (HIGH). A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself again...
How severe is CVE-2023-39331?
CVE-2023-39331 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-39331?
Check the references section above for vendor advisories and patch information. Affected products include: Nodejs Node.Js.