Логотип exploitDog
bind:CVE-2024-29180
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-29180

Количество 5

Количество 5

redhat логотип

CVE-2024-29180

почти 2 года назад

Prior to versions 7.1.0, 6.1.2, and 5.3.4, the webpack-dev-middleware development middleware for devpack does not validate the supplied URL address sufficiently before returning the local file. It is possible to access any file on the developer's machine. The middleware can either work with the physical filesystem when reading the files or it can use a virtualized in-memory `memfs` filesystem. If `writeToDisk` configuration option is set to `true`, the physical filesystem is used. The `getFilenameFromUrl` method is used to parse URL and build the local file path. The public path prefix is stripped from the URL, and the `unsecaped` path suffix is appended to the `outputPath`. As the URL is not unescaped and normalized automatically before calling the midlleware, it is possible to use `%2e` and `%2f` sequences to perform path traversal attack. Developers using `webpack-dev-server` or `webpack-dev-middleware` are affected by the issue. When the project is started, an attacker might acc...

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2024-29180

почти 2 года назад

Prior to versions 7.1.0, 6.1.2, and 5.3.4, the webpack-dev-middleware development middleware for devpack does not validate the supplied URL address sufficiently before returning the local file. It is possible to access any file on the developer's machine. The middleware can either work with the physical filesystem when reading the files or it can use a virtualized in-memory `memfs` filesystem. If `writeToDisk` configuration option is set to `true`, the physical filesystem is used. The `getFilenameFromUrl` method is used to parse URL and build the local file path. The public path prefix is stripped from the URL, and the `unsecaped` path suffix is appended to the `outputPath`. As the URL is not unescaped and normalized automatically before calling the midlleware, it is possible to use `%2e` and `%2f` sequences to perform path traversal attack. Developers using `webpack-dev-server` or `webpack-dev-middleware` are affected by the issue. When the project is started, an attacker might acces

CVSS3: 7.4
EPSS: Низкий
msrc логотип

CVE-2024-29180

5 месяцев назад

webpack-dev-middleware Path Traversal vulnerability

EPSS: Низкий
github логотип

GHSA-wr3j-pwj9-hqq6

почти 2 года назад

Path traversal in webpack-dev-middleware

CVSS3: 7.4
EPSS: Низкий
fstec логотип

BDU:2024-04278

почти 2 года назад

Уязвимость промежуточного программного обеспечения для фреймфорка Express Webpack-dev-middleware, связана с недостаточной проверкой URL-адреса, позволяющая получить несанкционированный доступ к защищаемой информации

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2024-29180

Prior to versions 7.1.0, 6.1.2, and 5.3.4, the webpack-dev-middleware development middleware for devpack does not validate the supplied URL address sufficiently before returning the local file. It is possible to access any file on the developer's machine. The middleware can either work with the physical filesystem when reading the files or it can use a virtualized in-memory `memfs` filesystem. If `writeToDisk` configuration option is set to `true`, the physical filesystem is used. The `getFilenameFromUrl` method is used to parse URL and build the local file path. The public path prefix is stripped from the URL, and the `unsecaped` path suffix is appended to the `outputPath`. As the URL is not unescaped and normalized automatically before calling the midlleware, it is possible to use `%2e` and `%2f` sequences to perform path traversal attack. Developers using `webpack-dev-server` or `webpack-dev-middleware` are affected by the issue. When the project is started, an attacker might acc...

CVSS3: 7.4
3%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-29180

Prior to versions 7.1.0, 6.1.2, and 5.3.4, the webpack-dev-middleware development middleware for devpack does not validate the supplied URL address sufficiently before returning the local file. It is possible to access any file on the developer's machine. The middleware can either work with the physical filesystem when reading the files or it can use a virtualized in-memory `memfs` filesystem. If `writeToDisk` configuration option is set to `true`, the physical filesystem is used. The `getFilenameFromUrl` method is used to parse URL and build the local file path. The public path prefix is stripped from the URL, and the `unsecaped` path suffix is appended to the `outputPath`. As the URL is not unescaped and normalized automatically before calling the midlleware, it is possible to use `%2e` and `%2f` sequences to perform path traversal attack. Developers using `webpack-dev-server` or `webpack-dev-middleware` are affected by the issue. When the project is started, an attacker might acces

CVSS3: 7.4
3%
Низкий
почти 2 года назад
msrc логотип
CVE-2024-29180

webpack-dev-middleware Path Traversal vulnerability

3%
Низкий
5 месяцев назад
github логотип
GHSA-wr3j-pwj9-hqq6

Path traversal in webpack-dev-middleware

CVSS3: 7.4
3%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-04278

Уязвимость промежуточного программного обеспечения для фреймфорка Express Webpack-dev-middleware, связана с недостаточной проверкой URL-адреса, позволяющая получить несанкционированный доступ к защищаемой информации

CVSS3: 7.4
3%
Низкий
почти 2 года назад

Уязвимостей на страницу