Add "IMPORTANT! Update Node.JS to 18.20.4, 20.15.1, 22.4.1 or newer!" post.
This commit is contained in:
parent
eceacb8ccd
commit
d3d8f8febc
2 changed files with 23 additions and 0 deletions
|
@ -0,0 +1,23 @@
|
|||
---
|
||||
title: IMPORTANT! Update Node.JS to 18.20.4, 20.15.1, 22.4.1 or newer!
|
||||
date: 2024-07-08 21:04:03
|
||||
tags:
|
||||
- cybersecurity
|
||||
- node.js
|
||||
category: Notices
|
||||
thumbnail: /images/covers/IMPORTANT-Update-Node-JS-to-18-20-4-20-15-1-22-4-1-or-newer.png
|
||||
---
|
||||
|
||||
**IMPORTANT! Update Node.JS to 18.20.4, 20.15.1, 22.4.1 or newer!**
|
||||
|
||||
Older versions of Node.JS had a [CVE-2024-22020 vulnerability](https://nodejs.org/en/blog/vulnerability/july-2024-security-releases#bypass-network-import-restriction-via-data-url-cve-2024-22020---medium), which involves embedding network imports in `data:` URLs to execute arbitrary code.
|
||||
|
||||
The original vulnerability description (from Node.JS blog):
|
||||
|
||||
_A security flaw in Node.js allows a bypass of network import restrictions._
|
||||
|
||||
_By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security._
|
||||
|
||||
_Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports._
|
||||
|
||||
_Exploiting this flaw can violate network import security, posing a risk to developers and servers._
|
Binary file not shown.
After Width: | Height: | Size: 92 KiB |
Reference in a new issue