CVE-2024-21892

On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.
Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.
This allows unprivileged users to inject code that inherits the process's elevated privileges.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
hackeroneCNA
7.5 HIGH
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
VendorProductVersion
nodejsnode.js
18.19.0 ≤
𝑥
≤ 18.19.0
nodejsnode.js
20.11.0 ≤
𝑥
≤ 20.11.0
nodejsnode.js
21.6.0 ≤
𝑥
≤ 21.6.0
nodejsnode.js
18.0.0 ≤
𝑥
< 18.19.1
nodejsnode.js
20.0.0 ≤
𝑥
< 20.11.1
nodejsnode.js
21.0.0 ≤
𝑥
< 21.6.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nodejs
bullseye
12.22.12~dfsg-1~deb11u4
not-affected
buster
not-affected
bullseye (security)
12.22.12~dfsg-1~deb11u7
fixed
bookworm
vulnerable
bookworm (security)
vulnerable
trixie
20.19.0+dfsg1-1
fixed
sid
20.19.2+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nodejs
noble
not-affected
mantic
ignored
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected