Description
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier has a vulnerability which allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API. The issue has been patched in Node-RED 1.2.8. The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. The primary workaround is not give untrusted users read access to the Node-RED editor.
Remediation
References
https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456
https://github.com/node-red/node-red/releases/tag/1.2.8
https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f
https://www.npmjs.com/package/%40node-red/runtime
Related Vulnerabilities
CVE-2020-7660 Vulnerability in maven package org.webjars.npm:serialize-javascript
CVE-2023-27479 Vulnerability in maven package org.xwiki.platform:xwiki-platform-panels-ui
CVE-2021-21626 Vulnerability in maven package io.jenkins.plugins:warnings-ng
CVE-2016-4216 Vulnerability in maven package com.adobe.xmp:xmpcore
CVE-2022-23913 Vulnerability in maven package org.apache.activemq:artemis-core-client