CVE-2023-32003

Name
CVE-2023-32003
Description
`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://hackerone.com/reports/2037887
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* nodejs >= None <= 20.5.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
nodejs 3.16-main 16.20.1-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
nodejs 3.15-main 16.20.1-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
nodejs 3.18-main 18.17.1-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
nodejs 3.17-main 18.17.1-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
nodejs edge-main 18.18.0-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable