QID 357300

Date Published: 2024-03-06

QID 357300: Amazon Linux Security Advisory for nodejs20 : ALAS2023-2024-544

the node.js permission model does not clarify in the documentation that wildcards should be only used as the last character of a file path. this misleading documentation affects all users using the experimental permission model in active release lines: 20.x and 21.x. please note that at the time this( CVE was issued, the permission model is an experimental feature of node.js. (
( CVE-2024-21890) note: https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/#multiple-permission-model-bypasses-due-to-improper-path-traversal-sequence-sanitization-cve-2024-21891---medium (cve-2024-21891) a flaw was found in node.js.
On linux, node.js ignores certain environment variables if they have been set by an unprivileged user while the process is running with elevated privileges, with the exception of cap_net_bind_service.
Due to a bug in the implementation of this exception, node.js incorrectly applies this exception even when other capabilities have been set.
This may allow unprivileged users to inject code that inherits the processes elevated privileges. (
( CVE-2024-21892) note: https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/#path-traversal-by-monkey-patching-buffer-internals-cve-2024-21896---high (cve-2024-21896) note: https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/#setuid-does-not-drop-all-privileges-due-to-io_uring-cve-2024-22017---high (cve-2024-22017) a flaw was found in node.js due to a lack of safeguards on chunk extension bytes.
( CVE-2024-22019) undici is an http/1.1 client, written from scratch for node.js.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Medium - 3.9 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2024-544 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2024-544 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2024-544.html