7.5 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
7.6 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.5%
On Linux, Node.js ignores certain environment variables if those may have
been set by an unprivileged user while the process is running with elevated
privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in
the implementation of this exception, Node.js incorrectly applies this
exception even when certain other capabilities have been set. This allows
unprivileged users to inject code that inherits the processโs elevated
privileges.
launchpad.net/bugs/cve/CVE-2024-21892
nodejs.org/en/blog/vulnerability/february-2024-security-releases/#code-injection-and-privilege-escalation-through-linux-capabilities-cve-2024-21892---high
nvd.nist.gov/vuln/detail/CVE-2024-21892
security-tracker.debian.org/tracker/CVE-2024-21892
www.cve.org/CVERecord?id=CVE-2024-21892
7.5 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
7.6 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.5%