CVE-2024-21892

On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set. This allows unprivileged users to inject code that inherits the process's elevated privileges.
References
Link Resource
http://www.openwall.com/lists/oss-security/2024/03/11/1 Mailing List Third Party Advisory
https://hackerone.com/reports/2237545 Issue Tracking Third Party Advisory
https://security.netapp.com/advisory/ntap-20240322-0003/ Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/11/1 Mailing List Third Party Advisory
https://hackerone.com/reports/2237545 Issue Tracking Third Party Advisory
https://security.netapp.com/advisory/ntap-20240322-0003/ Third Party Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-02-20 02:15

Updated : 2025-03-13 15:15


NVD link : CVE-2024-21892

Mitre link : CVE-2024-21892

CVE.ORG link : CVE-2024-21892


JSON object : View

Products Affected

linux

  • linux_kernel

nodejs

  • node.js
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-269

Improper Privilege Management