GHSA-CQV6-7FWC-8M3C
Vulnerability from github – Published: 2020-09-01 16:44 – Updated: 2023-09-11 23:14
VLAI?
Summary
Directory Traversal in xtalk
Details
Affected versions of xtalk are vulnerable to directory traversal, allowing access to the filesystem by placing "../" in the URL.
Example request:
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:localhost
Recommendation
No patch is currently available for this vulnerability, and the package has not been updated since 2014.
The best mitigation is currently to avoid using this package, and using a different, functionally equivalent package.
Severity ?
7.5 (High)
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "xtalk"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2017-16091"
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"github_reviewed": true,
"github_reviewed_at": "2020-08-31T18:19:52Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "Affected versions of `xtalk` are vulnerable to directory traversal, allowing access to the filesystem by placing \"../\" in the URL.\n\n**Example request:**\n```http\nGET /../../../../../../../../../../etc/passwd HTTP/1.1\nhost:localhost\n```\n\n\n\n\n## Recommendation\n\nNo patch is currently available for this vulnerability, and the package has not been updated since 2014.\n\nThe best mitigation is currently to avoid using this package, and using a different, functionally equivalent package.",
"id": "GHSA-cqv6-7fwc-8m3c",
"modified": "2023-09-11T23:14:59Z",
"published": "2020-09-01T16:44:59Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16091"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/339"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Directory Traversal in xtalk"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…