CVE-2021-21298: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
(updated )
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED has a vulnerability which allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with projects.read
permission is able to access any file via the Projects API. The issue has been patched in Node-RED The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. The primary workaround is not give untrusted users read access to the Node-RED editor.
References
- github.com/advisories/GHSA-m33v-338h-4v9f
- github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456
- github.com/node-red/node-red/releases/tag/1.2.8
- github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f
- nvd.nist.gov/vuln/detail/CVE-2021-21298
- www.npmjs.com/package/@node-red/runtime
Detect and mitigate CVE-2021-21298 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →