Breaking the Box: bypassing Node.js Filesystem Permissions via Symlinks (CVE-2025–55130)
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户给的文章是关于Node.js的一个安全漏洞的分析。首先,我得仔细阅读文章内容,抓住关键点。 文章提到Node.js近年来转向了更安全的默认架构,特别是权限模型的引入。这个模型允许开发者限制脚本访问资源的能力。但问题在于,在动态环境中实现严格的边界非常困难。 接着,文章详细描述了一个高危漏洞(CVE-2025–55130),是由安全研究员natann发现的。这个漏洞允许攻击者通过精心制作的符号链接绕过--allow-fs-read和--allow-fs-write这些限制,从而逃逸沙盒,访问敏感系统文件。 总结的时候,我需要涵盖Node.js权限模型的作用、漏洞的影响以及攻击手段。同时,要确保语言简洁明了,不超过100字。 可能的结构是:先说明Node.js的安全措施,然后指出漏洞及其影响。例如,“Node.js通过权限模型限制脚本资源访问以提高安全性。然而,研究人员发现高危漏洞CVE-2025–55130,利用符号链接绕过文件读写限制,导致敏感文件泄露。” 检查一下字数是否符合要求,并确保没有使用任何开头词如“这篇文章”或“内容总结”。这样就能满足用户的需求了。 </think> Node.js通过权限模型限制脚本资源访问以提高安全性。然而,研究人员发现高危漏洞CVE-2025–55130,利用符号链接绕过文件读写限制,导致敏感文件泄露。 2026-2-22 14:56:31 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Krishna Kumar

Based on the original report by natann on HackerOne: https://hackerone.com/reports/3417819

Node.js has increasingly moved toward secure-by-default architectures. One of the most significant additions in recent years has been the Permission Model, a mechanism allowing developers to restrict what resources a script can access (such as the filesystem, child processes, or worker threads). However, implementing strict boundaries in a dynamic environment like JavaScript is notoriously difficult.

In this writeup, we will analyze a High-severity vulnerability (CVE-2025–55130) discovered by security researcher natann. This bug allowed attackers to bypass the --allow-fs-read and --allow-fs-write flags using crafted symbolic links, effectively escaping the sandbox and accessing sensitive system files.

1. Introduction & Impact

The Node.js Permission Model allows users to run applications with the principle of least privilege. For example, if you run a script that only needs to process logs in a specific folder, you might use a command like this:

node --experimental-permission --allow-fs-read=./safe-folder index.js

The expectation is that the script cannot read anything outside of ./safe-folder. If the script attempts to read /etc/passwd or ../secret_config.json, Node.js should throw a permission error.


文章来源: https://infosecwriteups.com/breaking-the-box-bypassing-node-js-filesystem-permissions-via-symlinks-cve-2025-55130-0b9ad44920f9?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh