{"id":"CVE-2023-23920","details":"An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.","aliases":["BIT-node-2023-23920","BIT-node-min-2023-23920"],"modified":"2026-02-11T14:42:04.223874Z","published":"2023-02-23T20:15:14.047Z","related":["ALSA-2023:1582","ALSA-2023:1583","ALSA-2023:1743","ALSA-2023:2654","ALSA-2023:2655","MGASA-2023-0078","SUSE-SU-2023:0606-1","SUSE-SU-2023:0607-1","SUSE-SU-2023:0608-1","SUSE-SU-2023:0609-1","SUSE-SU-2023:0673-1","SUSE-SU-2023:0674-1","SUSE-SU-2023:0682-1","SUSE-SU-2023:0715-1","SUSE-SU-2023:0738-1","openSUSE-SU-2024:12725-1","openSUSE-SU-2024:12726-1"],"references":[{"type":"ADVISORY","url":"https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230316-0008/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5395"},{"type":"FIX","url":"https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00038.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"fixed":"7bc2cf7fa9a2016fadb27e042968a69297bd975e"},{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"fixed":"96a4559f259f109a2abc480caeba12644b8a8fd1"},{"introduced":"73aa21658dfa6a22c06451d080152b32b1f98dbe"},{"fixed":"edd64fe5ba20c6c2f53720c672c591f09d9d4ac0"},{"introduced":"cc993fb2760d01457955f5b9ff787d559ed1c34e"},{"fixed":"a9d1e5059f9cc63cafc8e786a7b6332aa7ab3b2b"}]}],"versions":["v14.0.0","v14.1.0","v14.10.0","v14.10.1","v14.11.0","v14.12.0","v14.13.0","v14.13.1","v14.14.0","v14.15.0","v14.15.1","v14.15.2","v14.15.3","v14.15.4","v14.15.5","v14.16.0","v14.16.1","v14.17.0","v14.17.1","v14.17.2","v14.17.3","v14.17.4","v14.17.5","v14.17.6","v14.18.0","v14.18.1","v14.18.2","v14.18.3","v14.19.0","v14.19.1","v14.19.2","v14.19.3","v14.2.0","v14.20.0","v14.20.1","v14.21.0","v14.21.1","v14.21.2","v14.3.0","v14.4.0","v14.5.0","v14.6.0","v14.7.0","v14.8.0","v14.9.0","v16.0.0","v16.1.0","v16.10.0","v16.11.0","v16.11.1","v16.12.0","v16.13.0","v16.13.1","v16.13.2","v16.14.0","v16.14.1","v16.14.2","v16.15.0","v16.15.1","v16.16.0","v16.17.0","v16.17.1","v16.18.0","v16.18.1","v16.19.0","v16.2.0","v16.3.0","v16.4.0","v16.4.1","v16.4.2","v16.5.0","v16.6.0","v16.6.1","v16.6.2","v16.7.0","v16.8.0","v16.9.0","v16.9.1","v18.0.0","v18.1.0","v18.10.0","v18.11.0","v18.12.0","v18.12.1","v18.13.0","v18.14.0","v18.2.0","v18.3.0","v18.4.0","v18.5.0","v18.6.0","v18.7.0","v18.8.0","v18.9.0","v18.9.1","v19.0.0","v19.0.1","v19.1.0","v19.2.0","v19.3.0","v19.4.0","v19.5.0","v19.6.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-23920.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N"}]}