vulnerability
FreeBSD: (Multiple Advisories) (CVE-2024-21892): null -- null
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Feb 20, 2024 | Mar 2, 2024 | Feb 19, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Feb 20, 2024
Added
Mar 2, 2024
Modified
Feb 19, 2025
Description
On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.
Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.
This allows unprivileged users to inject code that inherits the process's elevated privileges.
Solution(s)
freebsd-upgrade-package-nodefreebsd-upgrade-package-node16freebsd-upgrade-package-node18freebsd-upgrade-package-node20freebsd-upgrade-package-node21freebsd-upgrade-package-null
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.