We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-30583



Description

fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the `--allow-fs-read` flag in Node.js 20. This flaw arises from a missing check in the `fs.openAsBlob()` API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

Reserved 2023-04-13 | Published 2024-09-07 | Updated 2024-09-26 | Assigner hackerone

Product status

Default status
unaffected

20.3.1 before 20.3.1
affected

References

nodejs.org/en/blog/vulnerability/june-2023-security-releases

cve.org (CVE-2023-30583)

nvd.nist.gov (CVE-2023-30583)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-30583

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.