5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.6 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
21.2%
fs.mkdtemp()
and fs.mkdtempSync()
can be used to bypass the permission
model check using a path traversal attack. This flaw arises from a missing
check in the fs.mkdtemp() API and the impact is a malicious actor could
create an arbitrary directory. This vulnerability affects all users using
the experimental permission model in Node.js 20. Please note that at the
time this CVE was issued, the permission model is an experimental feature
of Node.js.
Author | Note |
---|---|
sahnaseredini | This vulnerability affects all users using the experimental permission model which was introduced in Node.js 20 |
launchpad.net/bugs/cve/CVE-2023-32003
nodejs.org/en/blog/vulnerability/august-2023-security-releases#fsmkdtemp-and-fsmkdtempsync-are-missing-getvalidatedpath-checks-lowcve-2023-32003
nvd.nist.gov/vuln/detail/CVE-2023-32003
security-tracker.debian.org/tracker/CVE-2023-32003
www.cve.org/CVERecord?id=CVE-2023-32003
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.6 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
21.2%