Vulnerability Details CVE-2021-21298
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier has a vulnerability which allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API. The issue has been patched in Node-RED 1.2.8. The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. The primary workaround is not give untrusted users read access to the Node-RED editor.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 57.8%
CVSS Severity
CVSS v3 Score 3.5
CVSS v2 Score 3.5
Products affected by CVE-2021-21298
-
cpe:2.3:a:nodered:node-red:0.10.0
-
cpe:2.3:a:nodered:node-red:0.10.1
-
cpe:2.3:a:nodered:node-red:0.10.10
-
cpe:2.3:a:nodered:node-red:0.10.2
-
cpe:2.3:a:nodered:node-red:0.10.3
-
cpe:2.3:a:nodered:node-red:0.10.4
-
cpe:2.3:a:nodered:node-red:0.10.6
-
cpe:2.3:a:nodered:node-red:0.10.8
-
cpe:2.3:a:nodered:node-red:0.10.9
-
cpe:2.3:a:nodered:node-red:0.11.0
-
cpe:2.3:a:nodered:node-red:0.11.1
-
cpe:2.3:a:nodered:node-red:0.11.2
-
cpe:2.3:a:nodered:node-red:0.12.0
-
cpe:2.3:a:nodered:node-red:0.12.1
-
cpe:2.3:a:nodered:node-red:0.12.2
-
cpe:2.3:a:nodered:node-red:0.12.3
-
cpe:2.3:a:nodered:node-red:0.12.4
-
cpe:2.3:a:nodered:node-red:0.12.5
-
cpe:2.3:a:nodered:node-red:0.13.0
-
cpe:2.3:a:nodered:node-red:0.13.1
-
cpe:2.3:a:nodered:node-red:0.13.2
-
cpe:2.3:a:nodered:node-red:0.13.3
-
cpe:2.3:a:nodered:node-red:0.13.4
-
cpe:2.3:a:nodered:node-red:0.14.0
-
cpe:2.3:a:nodered:node-red:0.14.1
-
cpe:2.3:a:nodered:node-red:0.14.2
-
cpe:2.3:a:nodered:node-red:0.14.3
-
cpe:2.3:a:nodered:node-red:0.14.4
-
cpe:2.3:a:nodered:node-red:0.14.5
-
cpe:2.3:a:nodered:node-red:0.14.6
-
cpe:2.3:a:nodered:node-red:0.15.0
-
cpe:2.3:a:nodered:node-red:0.15.1
-
cpe:2.3:a:nodered:node-red:0.15.2
-
cpe:2.3:a:nodered:node-red:0.15.3
-
cpe:2.3:a:nodered:node-red:0.16.0
-
cpe:2.3:a:nodered:node-red:0.16.1
-
cpe:2.3:a:nodered:node-red:0.16.2
-
cpe:2.3:a:nodered:node-red:0.17.0
-
cpe:2.3:a:nodered:node-red:0.17.1
-
cpe:2.3:a:nodered:node-red:0.17.2
-
cpe:2.3:a:nodered:node-red:0.17.3
-
cpe:2.3:a:nodered:node-red:0.17.4
-
cpe:2.3:a:nodered:node-red:0.17.5
-
cpe:2.3:a:nodered:node-red:0.18.0
-
cpe:2.3:a:nodered:node-red:0.18.1
-
cpe:2.3:a:nodered:node-red:0.18.2
-
cpe:2.3:a:nodered:node-red:0.18.3
-
cpe:2.3:a:nodered:node-red:0.18.4
-
cpe:2.3:a:nodered:node-red:0.18.5
-
cpe:2.3:a:nodered:node-red:0.18.6
-
cpe:2.3:a:nodered:node-red:0.18.7
-
cpe:2.3:a:nodered:node-red:0.19.0
-
cpe:2.3:a:nodered:node-red:0.19.1
-
cpe:2.3:a:nodered:node-red:0.19.2
-
cpe:2.3:a:nodered:node-red:0.19.3
-
cpe:2.3:a:nodered:node-red:0.19.4
-
cpe:2.3:a:nodered:node-red:0.19.5
-
cpe:2.3:a:nodered:node-red:0.19.6
-
cpe:2.3:a:nodered:node-red:0.2.0
-
cpe:2.3:a:nodered:node-red:0.20.0
-
cpe:2.3:a:nodered:node-red:0.20.1
-
cpe:2.3:a:nodered:node-red:0.20.2
-
cpe:2.3:a:nodered:node-red:0.20.3
-
cpe:2.3:a:nodered:node-red:0.20.4
-
cpe:2.3:a:nodered:node-red:0.20.5
-
cpe:2.3:a:nodered:node-red:0.20.6
-
cpe:2.3:a:nodered:node-red:0.20.7
-
cpe:2.3:a:nodered:node-red:0.20.8
-
cpe:2.3:a:nodered:node-red:0.3.0
-
cpe:2.3:a:nodered:node-red:0.4.0
-
cpe:2.3:a:nodered:node-red:0.5.0
-
cpe:2.3:a:nodered:node-red:0.6.0
-
cpe:2.3:a:nodered:node-red:0.7.0
-
cpe:2.3:a:nodered:node-red:0.7.1
-
cpe:2.3:a:nodered:node-red:0.7.2
-
cpe:2.3:a:nodered:node-red:0.8.0
-
cpe:2.3:a:nodered:node-red:0.8.1
-
cpe:2.3:a:nodered:node-red:0.9.0
-
cpe:2.3:a:nodered:node-red:0.9.1
-
cpe:2.3:a:nodered:node-red:1.0.0
-
cpe:2.3:a:nodered:node-red:1.0.1
-
cpe:2.3:a:nodered:node-red:1.0.2
-
cpe:2.3:a:nodered:node-red:1.0.3