Описание
Directory Traversal in geddy
Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors.
Proof of Concept
http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd
Recommendation
Update geddy to version >= 13.0.8
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-5688
- https://github.com/geddy/geddy/issues/697
- https://github.com/geddy/geddy/pull/699
- https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231
- https://github.com/advisories/GHSA-333x-9vgq-v2j4
- https://github.com/geddy/geddy/releases/tag/v13.0.8
- https://www.npmjs.com/advisories/10
Пакеты
Наименование
geddy
npm
Затронутые версииВерсия исправления
< 13.0.8
13.0.8
Связанные уязвимости
nvd
больше 10 лет назад
Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.