{"id":"BIT-node-2023-39331","details":"A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.","aliases":["BIT-node-min-2023-39331","CVE-2023-39331"],"modified":"2025-11-06T13:25:46.476Z","published":"2024-03-06T10:59:16.754Z","database_specific":{"cpes":["cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"],"severity":"High"},"references":[{"type":"WEB","url":"https://hackerone.com/reports/2092852"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20231116-0009/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39331"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20241108-0002/"}],"affected":[{"package":{"name":"node","ecosystem":"Bitnami","purl":"pkg:bitnami/node"},"ranges":[{"type":"SEMVER","events":[{"introduced":"20.0.0"},{"fixed":"20.8.1"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/node/BIT-node-2023-39331.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}],"schema_version":"1.7.3"}