Miggo Logo

CVE-2024-36137:
A vulnerability has been identified in Node.js, affecting users of the experimental permission...

3.3

CVSS Score

Basic Information

EPSS Score
-
CWE
-
Published
9/7/2024
Updated
11/22/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description and the official Node.js security advisory explicitly mention fs.fchown and fs.fchmod as the functions that can bypass the permission model. These functions, part of the built-in 'fs' module, allow modification of file ownership and permissions using a file descriptor, even if that descriptor was obtained with read-only access. This behavior circumvents the intended restrictions of the experimental permission model when the --allow-fs-write flag is active. Since no commit information was provided, the analysis relies on the textual descriptions of the vulnerability from trusted sources like the Node.js security blog and GitHub advisories which clearly identify these functions as the source of the vulnerability by allowing operations on file descriptors that should be restricted by the permission model under certain conditions (use of --allow-fs-write flag).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility **s ***n i**nti*i** in No**.js, *****tin* us*rs o* t** *xp*rim*nt*l p*rmission mo**l w**n t** --*llow-*s-writ* *l** is us**. No**.js P*rmission Mo**l *o not op*r*t* on *il* **s*riptors, *ow*v*r, op*r*tions su** *s *s.***own or *s.***

Reasoning

T** vuln*r**ility **s*ription *n* t** o**i*i*l No**.js s**urity **visory *xpli*itly m*ntion `*s.***own` *n* `*s.***mo*` *s t** *un*tions t**t **n *yp*ss t** p*rmission mo**l. T**s* *un*tions, p*rt o* t** *uilt-in '*s' mo*ul*, *llow mo*i*i**tion o* *i