Improper Privilege Management Affecting nodejs10 package, versions <10.18.0-1.15.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES151-NODEJS10-2718696
- published 14 Apr 2022
- disclosed 15 Jan 2020
Introduced: 15 Jan 2020
CVE-2019-16777 Open this link in a new tabHow to fix?
Upgrade SLES:15.1 nodejs10 to version 10.18.0-1.15.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nodejs10 package and not the nodejs10 package as distributed by SLES.
See How to fix? for SLES:15.1 relevant fixed versions and status.
Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of packages that also create a serve binary would overwrite the previous serve binary. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
References
- https://www.suse.com/security/cve/CVE-2019-16777.html
- https://bugzilla.suse.com/1159352
- https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
- https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
- https://access.redhat.com/errata/RHEA-2020:0330
- https://access.redhat.com/errata/RHSA-2020:0573
- https://access.redhat.com/errata/RHSA-2020:0579
- https://access.redhat.com/errata/RHSA-2020:0597
- https://access.redhat.com/errata/RHSA-2020:0602
- https://security.gentoo.org/glsa/202003-48
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/