Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLW0zM3YtMzM4aC00djlm
Path traversal in Node-Red
Impact
This vulnerability allows arbitrary path traversal via the Projects API.
If the Projects feature is enabled, a user with projects.read
permission is able to access any file via the Projects API.
Patches
The issue has been patched in Node-RED 1.2.8
Workarounds
The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED.
The primary workaround is not give untrusted users read access to the Node-RED editor.
For more information
If you have any questions or comments about this advisory:
- Email us at [email protected]
Acknowledgements
Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
Permalink: https://github.com/advisories/GHSA-m33v-338h-4v9fJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLW0zM3YtMzM4aC00djlm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: almost 3 years ago
Updated: 10 months ago
Identifiers: GHSA-m33v-338h-4v9f, CVE-2021-21298
References:
- https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f
- https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456
- https://github.com/node-red/node-red/releases/tag/1.2.8
- https://www.npmjs.com/package/@node-red/runtime
- https://nvd.nist.gov/vuln/detail/CVE-2021-21298
- https://github.com/advisories/GHSA-m33v-338h-4v9f
Affected Packages
npm:@node-red/runtime
Versions: < 1.2.8Fixed in: 1.2.8