Looking for the vulnerability index of Invicti's legacy products?
Node.js path validation vulnerability - Vulnerability Database

Node.js path validation vulnerability

Description

Node.js version 8.5.0 introduced a regression in path normalization logic that weakened security checks performed by certain community modules. This flaw allows attackers to bypass path validation controls and traverse directory structures to access files outside of intended boundaries. The vulnerability is specific to Node.js 8.5.0 only; versions 4.x, 6.x, and other 8.x releases are not affected.

This is a path traversal vulnerability (CWE-22) that undermines the security assumptions of modules relying on Node.js core path validation.

Remediation

Immediately upgrade from Node.js 8.5.0 to version 8.6.0 or later, which includes the security patch released in September 2017. Follow these steps:

1. Verify your current Node.js version by running:

node --version
2. If the output shows v8.5.0, upgrade to the latest stable version using your package manager (nvm, apt, yum, etc.) or download from the official Node.js website
3. After upgrading, restart all Node.js applications and services
4. Verify the upgrade was successful by checking the version again

If immediate upgrade is not possible, avoid using Node.js 8.5.0 in production environments and revert to version 8.4.0 or upgrade to 8.6.0+ as a temporary mitigation.