`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory.
This vulnerability affects all users using the experimental permission model in Node.js 20.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-02-13T16:50:17.203Z
Reserved: 2023-05-01T01:00:12.220Z
Link: CVE-2023-32003

Updated: 2024-08-02T15:03:28.792Z

Status : Modified
Published: 2023-08-15T16:15:10.970
Modified: 2024-11-21T08:02:30.480
Link: CVE-2023-32003
