Vulnerability Description
An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor states "we dispute the report's accuracy ... the configuration does not enable remote code execution.."
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Postman | Postman | < 10.22 |
| Apple | Macos | - |
References
- https://github.com/V3x0r/CVE-2024-23738Exploit
- https://www.electronjs.org/blog/statement-run-as-node-cves
- https://github.com/V3x0r/CVE-2024-23738Exploit
- https://www.electronjs.org/blog/statement-run-as-node-cves
FAQ
What is CVE-2024-23738?
CVE-2024-23738 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor states "we dispu...
How severe is CVE-2024-23738?
CVE-2024-23738 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-23738?
Check the references section above for vendor advisories and patch information. Affected products include: Postman Postman, Apple Macos.