NodeBB is Node.js based forum software. Starting in version 2.5.0 and prior to version 2.8.7, due to the use of the object destructuring assignment syntax in the user export code path, combined with a path traversal vulnerability, a specially crafted payload could invoke the user export logic to arbitrarily execute javascript files on the local disk. This issue is patched in version 2.8.7. As a workaround, site maintainers can cherry pick the fix into their codebase to patch the exploit.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:nodebb:nodebb:*:*:*:*:*:*:*:* | |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T16:44:43.667Z
Reserved: 2023-02-17T22:44:03.149Z
Link: CVE-2023-26045

Updated: 2024-08-02T11:39:06.562Z

Status : Modified
Published: 2023-07-24T22:15:10.033
Modified: 2024-11-21T07:50:39.100
Link: CVE-2023-26045

No data.