Breaking the Box: bypassing Node.js Filesystem Permissions via Symlinks (CVE-2025–55130)
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读用户提供的文章内容。这篇文章主要讲的是Node.js的权限模型中发现的一个高危漏洞,CVE-2025-55130。这个漏洞允许攻击者绕过--allow-fs-read和--allow-fs-write这些安全限制,通过创建符号链接来访问受限的文件系统资源。 接下来,我需要确定用户的需求是什么。用户希望用中文总结文章内容,并且控制在100字以内。不需要使用“文章内容总结”之类的开头,直接写描述即可。这意味着我的总结要简洁明了,涵盖主要点:漏洞名称、影响、攻击方式以及后果。 然后,我要考虑如何将这些信息浓缩到100字以内。首先提到Node.js的权限模型,默认安全架构的一部分。然后指出发现了高危漏洞CVE-2025-55130,允许攻击者利用符号链接绕过文件读写限制,从而访问敏感系统文件。 最后,检查字数是否符合要求,并确保语言流畅自然。确保没有遗漏关键信息,同时保持简洁。 </think> Node.js默认安全架构中发现高危漏洞CVE-2025-55130,攻击者可利用符号链接绕过文件读写限制,访问受限系统文件。 2026-2-22 14:56:31 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Krishna Kumar

Based on the original report by natann on HackerOne: https://hackerone.com/reports/3417819

Node.js has increasingly moved toward secure-by-default architectures. One of the most significant additions in recent years has been the Permission Model, a mechanism allowing developers to restrict what resources a script can access (such as the filesystem, child processes, or worker threads). However, implementing strict boundaries in a dynamic environment like JavaScript is notoriously difficult.

In this writeup, we will analyze a High-severity vulnerability (CVE-2025–55130) discovered by security researcher natann. This bug allowed attackers to bypass the --allow-fs-read and --allow-fs-write flags using crafted symbolic links, effectively escaping the sandbox and accessing sensitive system files.

1. Introduction & Impact

The Node.js Permission Model allows users to run applications with the principle of least privilege. For example, if you run a script that only needs to process logs in a specific folder, you might use a command like this:

node --experimental-permission --allow-fs-read=./safe-folder index.js

The expectation is that the script cannot read anything outside of ./safe-folder. If the script attempts to read /etc/passwd or ../secret_config.json, Node.js should throw a permission error.


文章来源: https://infosecwriteups.com/breaking-the-box-bypassing-node-js-filesystem-permissions-via-symlinks-cve-2025-55130-0b9ad44920f9?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh