Platform
nodejs
Component
webcrack
Fixed in
2.14.1
2.14.1
CVE-2024-43373 describes an arbitrary file access vulnerability discovered in the webcrack module, a Node.js package. This flaw allows attackers to overwrite files on a Windows host system by crafting malicious code and exploiting the unpack bundles and saving features. The vulnerability impacts versions of webcrack prior to 2.14.1 and has been publicly disclosed on August 14, 2024. A fix is available in version 2.14.1.
The primary impact of CVE-2024-43373 is the potential for arbitrary file overwrites on a Windows system. An attacker could leverage this vulnerability to modify critical system files, install malware, or gain persistent access to the compromised machine. The vulnerability arises from insufficient input validation when processing file paths during the unpack bundles and saving operations. By injecting path traversal sequences (e.g., ../) into the module name, an attacker can bypass security checks and write files to arbitrary locations. This could lead to complete system compromise, depending on the permissions of the process running webcrack.
CVE-2024-43373 was publicly disclosed on August 14, 2024. There is currently no indication of active exploitation in the wild, nor is it listed on the CISA KEV catalog. Public proof-of-concept exploits are not yet widely available, but the vulnerability's nature suggests that such exploits are likely to emerge. Given the ease of exploitation once a PoC is available, organizations should prioritize patching.
Exploit Status
EPSS
0.21% (43% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2024-43373 is to upgrade to webcrack version 2.14.1 or later, which includes the necessary fix. If upgrading immediately is not feasible, consider implementing temporary workarounds. Restrict the execution of webcrack to a sandboxed environment with limited file system access. Implement strict input validation on all file paths processed by the unpack bundles and saving features, ensuring that path traversal sequences are properly sanitized. Monitor system logs for suspicious file modification activity, particularly in sensitive directories. Consider using a Web Application Firewall (WAF) to filter out malicious requests containing path traversal attempts.
Actualice la versión de webcrack a la versión 2.14.1 o superior. Esto corrige la vulnerabilidad de escritura arbitraria de archivos. Puede actualizar el paquete utilizando npm o yarn.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-43373 is a HIGH severity vulnerability in webcrack allowing attackers to overwrite files on Windows systems by exploiting the unpack bundles and saving features. It affects versions prior to 2.14.1.
You are affected if you are using webcrack versions prior to 2.14.1 and your application processes user-supplied file paths without proper validation.
Upgrade to webcrack version 2.14.1 or later to remediate the vulnerability. If immediate upgrade is not possible, implement input validation and restrict file system access.
There is currently no indication of active exploitation in the wild, but the vulnerability's nature suggests that exploits are likely to emerge.
Refer to the GitHub repository for webcrack: https://github.com/j4k0xb/webcrack
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.