Skip to content

Path traversal in Node-Red

Low severity GitHub Reviewed Published Feb 19, 2021 in node-red/node-red • Updated Feb 1, 2023

Package

npm @node-red/runtime (npm)

Affected versions

< 1.2.8

Patched versions

1.2.8

Description

Impact

This vulnerability allows arbitrary path traversal via the Projects API.

If the Projects feature is enabled, a user with projects.read permission is able to access any file via the Projects API.

Patches

The issue has been patched in Node-RED 1.2.8

Workarounds

The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED.

The primary workaround is not give untrusted users read access to the Node-RED editor.

For more information

If you have any questions or comments about this advisory:

Acknowledgements

Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.

References

@knolleary knolleary published to node-red/node-red Feb 19, 2021
Reviewed Feb 26, 2021
Published to the GitHub Advisory Database Feb 26, 2021
Published by the National Vulnerability Database Feb 26, 2021
Last updated Feb 1, 2023

Severity

Low

EPSS score

0.092%
(41st percentile)

Weaknesses

CVE ID

CVE-2021-21298

GHSA ID

GHSA-m33v-338h-4v9f

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.