Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2024-21890 CVE-2024-21891 CVE-2024-21892 CVE-2024-21896 CVE-2024-22017 CVE-2024-22019 CVE-2024-22025 CVE-2024-24758 |
CWE-ID | CWE-1068 CWE-22 CWE-755 CWE-269 CWE-20 CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system nodejs20 Operating systems & Components / Operating system package or component |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU86728
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-21890
CWE-ID:
CWE-1068 - Inconsistency Between Implementation and Documented Design
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to improper handling of wildcards in --allow-fs-read and --allow-fs-write. A remote attacker can gain access to sensitive information.
Update the affected packages:
aarch64:Vulnerable software versions
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-libs-20.11.1-1.amzn2023.0.1.aarch64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-devel-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.aarch64
noarch:
nodejs20-docs-20.11.1-1.amzn2023.0.1.noarch
src:
nodejs20-20.11.1-1.amzn2023.0.1.src
x86_64:
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-devel-20.11.1-1.amzn2023.0.1.x86_64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-libs-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
nodejs20: before 20.11.1-1
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-544.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86726
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-21891
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-libs-20.11.1-1.amzn2023.0.1.aarch64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-devel-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.aarch64
noarch:
nodejs20-docs-20.11.1-1.amzn2023.0.1.noarch
src:
nodejs20-20.11.1-1.amzn2023.0.1.src
x86_64:
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-devel-20.11.1-1.amzn2023.0.1.x86_64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-libs-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
nodejs20: before 20.11.1-1
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-544.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86718
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-21892
CWE-ID:
CWE-755 - Improper Handling of Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way certain environment variables are handled by Node.js on Linux. A local user can use a specially crafted environment variable to escalate privileges on the system.
Update the affected packages:
aarch64:Vulnerable software versions
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-libs-20.11.1-1.amzn2023.0.1.aarch64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-devel-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.aarch64
noarch:
nodejs20-docs-20.11.1-1.amzn2023.0.1.noarch
src:
nodejs20-20.11.1-1.amzn2023.0.1.src
x86_64:
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-devel-20.11.1-1.amzn2023.0.1.x86_64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-libs-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
nodejs20: before 20.11.1-1
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-544.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86722
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-21896
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in Buffer.prototype.utf8Write. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-libs-20.11.1-1.amzn2023.0.1.aarch64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-devel-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.aarch64
noarch:
nodejs20-docs-20.11.1-1.amzn2023.0.1.noarch
src:
nodejs20-20.11.1-1.amzn2023.0.1.src
x86_64:
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-devel-20.11.1-1.amzn2023.0.1.x86_64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-libs-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
nodejs20: before 20.11.1-1
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-544.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86723
Risk: Low
CVSSv4.0: 7.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/U:Clear]
CVE-ID: CVE-2024-22017
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges.
The vulnerability exists due to setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). A local user can escalate privileges on the system.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-libs-20.11.1-1.amzn2023.0.1.aarch64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-devel-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.aarch64
noarch:
nodejs20-docs-20.11.1-1.amzn2023.0.1.noarch
src:
nodejs20-20.11.1-1.amzn2023.0.1.src
x86_64:
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-devel-20.11.1-1.amzn2023.0.1.x86_64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-libs-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
nodejs20: before 20.11.1-1
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-544.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86721
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-22019
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing HTTP requests with chunked encoding. A remote attacker can send specially crafted HTTP request to the server and perform a denial of service (DoS) attack.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-libs-20.11.1-1.amzn2023.0.1.aarch64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-devel-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.aarch64
noarch:
nodejs20-docs-20.11.1-1.amzn2023.0.1.noarch
src:
nodejs20-20.11.1-1.amzn2023.0.1.src
x86_64:
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-devel-20.11.1-1.amzn2023.0.1.x86_64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-libs-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
nodejs20: before 20.11.1-1
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-544.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86733
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-22025
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when handling brotli decoding. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-libs-20.11.1-1.amzn2023.0.1.aarch64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-devel-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.aarch64
noarch:
nodejs20-docs-20.11.1-1.amzn2023.0.1.noarch
src:
nodejs20-20.11.1-1.amzn2023.0.1.src
x86_64:
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-devel-20.11.1-1.amzn2023.0.1.x86_64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-libs-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
nodejs20: before 20.11.1-1
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-544.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86709
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-24758
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the application does not clear the Proxy-Authentication HTTP header when handling cross-origin redirects. A remote attacker can gain access to sensitive information.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-libs-20.11.1-1.amzn2023.0.1.aarch64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-devel-20.11.1-1.amzn2023.0.1.aarch64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.aarch64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.aarch64
noarch:
nodejs20-docs-20.11.1-1.amzn2023.0.1.noarch
src:
nodejs20-20.11.1-1.amzn2023.0.1.src
x86_64:
nodejs20-libs-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-debuginfo-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-full-i18n-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-devel-20.11.1-1.amzn2023.0.1.x86_64
v8-11.3-devel-11.3.244.8-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-libs-20.11.1-1.amzn2023.0.1.x86_64
nodejs20-npm-10.2.4-1.20.11.1.1.amzn2023.0.1.x86_64
nodejs20-debugsource-20.11.1-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
nodejs20: before 20.11.1-1
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-544.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.