Description
Version
v18.17.0
Platform
Darwin AkiranoMacBook-Pro.local 21.6.0 Darwin Kernel Version 21.6.0: Thu Jul 6 22:18:26 PDT 2023; root:xnu-8020.240.18.702.13~1/RELEASE_X86_64 x86_64
Subsystem
No response
What steps will reproduce the bug?
I believe this is not the bug for Node.js itself and this vulnerability should be there only when we use some experimental flag against Node.js 19 or something as runtime args
Security scan bot - Twistlock reported Node.js v18.17.0 is vulnerable due to following. But Node.js v20 is not LTS, so I believe we should not use them in production..
CVE: PRISMA-2023-0054
severity: M
Link: #47105
hasFix: Y
Status: fixed in 20.0.0
Description:
nodejs before 20.0.0 is vulnerable to authentication bypass. process.permission.deny() does not verify if given paths are case-sensitive or not, and thus by supplying a differently capitalized path on an OS that supports non-case-sensitive paths, the only way to properly deny a path is to deny every capitalization of said path. cvss vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
How often does it reproduce? Is there a required condition?
Always
What is the expected behavior? Why is that the expected behavior?
This CVE should not be given to the latest LTS.
What do you see instead?
N/A
Additional information
No response