Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xwg4-93c6-3h42

Опубликовано: 24 окт. 2017
Источник: github
Github: Прошло ревью

Описание

Directory Traversal in send

Versions 0.8.3 and earlier of send are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory.

For example, static(_dirname + '/public') would allow access to _dirname + '/public-restricted'.

Recommendation

Update to version 0.8.4 or later.

Пакеты

Наименование

send

npm
Затронутые версииВерсия исправления

< 0.8.4

0.8.4

EPSS

Процентиль: 89%
0.04842
Низкий

Дефекты

CWE-22

Связанные уязвимости

ubuntu
больше 10 лет назад

visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory.

redhat
почти 11 лет назад

visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory.

nvd
больше 10 лет назад

visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory.

debian
больше 10 лет назад

visionmedia send before 0.8.4 for Node.js uses a partial comparison fo ...

EPSS

Процентиль: 89%
0.04842
Низкий

Дефекты

CWE-22