The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
Vulnerable Package issue exists @ Npm-grunt-1.0.3 in branch master
file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in versions prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.
Additional InfoAttack vector: LOCAL
Attack complexity: HIGH
Confidentiality impact: HIGH
Availability impact: HIGH
Remediation Upgrade Recommendation: 1.5.3
Vulnerable Package issue exists @ Npm-grunt-1.0.3 in branch master
file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in versions prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.
Namespace: RobertMickleCx Repository: NodeGoat Repository Url: https://github.com/RobertMickleCx/NodeGoat CxAST-Project: RobertMickleCx/NodeGoat CxAST platform scan: 421abb05-2701-4c6b-8cb3-89f91b91b3aa Branch: master Application: NodeGoat Severity: HIGH State: NOT_IGNORED Status: RECURRENT CWE: CWE-367
Additional Info Attack vector: LOCAL Attack complexity: HIGH Confidentiality impact: HIGH Availability impact: HIGH Remediation Upgrade Recommendation: 1.5.3
References Advisory Pull request Commit Release Note Disclosure