All versions of package easy-static-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the req.url user input that is passed to the server code.
References
Link | Resource |
---|---|
https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9 | Exploit Third Party Advisory |
https://github.com/cunjieliu/easyServer/blob/master/index.js%23L27 | Broken Link Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2022-12-20T00:00:00
Updated: 2022-12-20T00:00:00
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-25931
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-12-20T05:15:11.587
Modified: 2022-12-29T18:45:08.617
Link: CVE-2022-25931
JSON object: View
Redhat Information
No data.
CWE