Lucene search

K
vulnrichmentHackeroneVULNRICHMENT:CVE-2024-36138
HistorySep 07, 2024 - 4:00 p.m.

CVE-2024-36138

2024-09-0716:00:36
hackerone
github.com
2
cve-2024-36138
windows
code execution

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:nodejs:nodejs:*:*:*:*:*:*:*:*"
    ],
    "vendor": "nodejs",
    "product": "nodejs",
    "versions": [
      {
        "status": "affected",
        "version": "18.0",
        "lessThan": "18.20.4",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "20.0",
        "lessThan": "20.15.1",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.0",
        "lessThan": "22.4.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total