Skip to content

Path traversal and code execution via prototype vulnerability

Critical
julianlam published GHSA-vh2g-6c4x-5hmp Jul 24, 2023

Package

npm nodebb (npm)

Affected versions

>=2.5.0 <2.8.7

Patched versions

2.8.7

Description

Impact

Due to the use of the object destructuring assignment syntax in the user export code path, combined with a path traversal vulnerability, a specially crafted payload could invoke the user export logic to arbitrarily execute javascript files on the local disk.

Patches

Patched in v2.8.7

Workarounds

Site maintainers can cherry pick ec58700 into their codebase to patch the exploit.

Severity

Critical
10.0
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE ID

CVE-2023-26045

Credits