Lucene search

K
nodejsIlya KantorNODEJS:32
HistoryOct 17, 2015 - 7:41 p.m.

Directory Traversal

2015-10-1719:41:46
Ilya Kantor
www.npmjs.com
15

0.026 Low

EPSS

Percentile

90.4%

Overview

Versions 0.8.3 and earlier of send are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory.

For example, static(_dirname + '/public') would allow access to _dirname + '/public-restricted'.

Recommendation

Update to version 0.8.4 or later.

References

CPENameOperatorVersion
sendlt 0.8.4