CVE-2021-21298
low-risk
Published 2021-02-26
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier has a vulnerability which allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API. The issue has been patched in Node-RED 1.2.8. The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. The primary workaround is not give untrusted users read access to the Node-RED editor.
Do I need to act?
-
0.36% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.5/10
Low
NETWORK
/ HIGH complexity
Affected Products (1)
Node-Red
Affected Vendors
References (8)
Release Notes
https://github.com/node-red/node-red/releases/tag/1.2.8
Third Party Advisory
https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f
Release Notes
https://github.com/node-red/node-red/releases/tag/1.2.8
Third Party Advisory
https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f
18
/ 100
low-risk
Severity
12/34 · Low
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal