Description
NodeBB is Node.js based forum software. Starting in version 2.5.0 and prior to version 2.8.7, due to the use of the object destructuring assignment syntax in the user export code path, combined with a path traversal vulnerability, a specially crafted payload could invoke the user export logic to arbitrarily execute javascript files on the local disk. This issue is patched in version 2.8.7. As a workaround, site maintainers can cherry pick the fix into their codebase to patch the exploit.
Remediation
References
https://github.com/NodeBB/NodeBB/commit/ec58700f6dff8e5b4af1544f6205ec362b593092
https://github.com/NodeBB/NodeBB/security/advisories/GHSA-vh2g-6c4x-5hmp
https://security.netapp.com/advisory/ntap-20230831-0004/
Related Vulnerabilities
CVE-2023-29213 Vulnerability in maven package org.xwiki.platform:xwiki-platform-logging-script
CVE-2023-41037 Vulnerability in maven package org.webjars.bowergithub.openpgpjs:openpgpjs
CVE-2016-3081 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2021-26707 Vulnerability in npm package merge-deep
CVE-2019-20921 Vulnerability in maven package org.webjars.npm:bootstrap-select