ID GHSA-94X5-94WF-M445 Type github Reporter GitHub Advisory Database Modified 2021-01-08T19:06:21
Description
Affected versions of gomeplus-h5-proxy resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{"id": "GHSA-94X5-94WF-M445", "bulletinFamily": "software", "title": "Directory Traversal in gomeplus-h5-proxy", "description": "Affected versions of `gomeplus-h5-proxy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.\n\nExample request:\n```\nGET /../../../../../../../../../../etc/passwd HTTP/1.1\nhost:foo\n```\n\n\n## Recommendation\n\nNo patch is available for this vulnerability.\n\nIt is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.", "published": "2018-07-24T15:48:38", "modified": "2021-01-08T19:06:21", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "href": "https://github.com/advisories/GHSA-94x5-94wf-m445", "reporter": "GitHub Advisory Database", "references": ["https://nvd.nist.gov/vuln/detail/CVE-2017-16037", "https://github.com/advisories/GHSA-94x5-94wf-m445"], "cvelist": ["CVE-2017-16037"], "type": "github", "lastseen": "2021-01-08T22:27:16", "edition": 4, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2017-16037"]}, {"type": "nodejs", "idList": ["NODEJS:350"]}, {"type": "github", "idList": ["GHSA-94X5-94WF-M445"]}], "modified": "2021-01-08T22:27:16", "rev": 2}, "score": {"value": 8.0, "vector": "NONE", "modified": "2021-01-08T22:27:16", "rev": 2}, "vulnersScore": 8.0}, "affectedSoftware": [{"name": "gomeplus-h5-proxy", "operator": "lt", "version": "1"}], "scheme": null}
{"cve": [{"lastseen": "2021-02-02T06:36:38", "description": "`gomeplus-h5-proxy` is vulnerable to a directory traversal issue, allowing attackers to access any file in the system by placing '../' in the URL.", "edition": 5, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-06-04T19:29:00", "title": "CVE-2017-16037", "type": "cve", "cwe": ["CWE-22"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-16037"], "modified": "2019-10-09T23:24:00", "cpe": ["cpe:/a:gomeplus-h5-proxy_project:gomeplus-h5-proxy:*"], "id": "CVE-2017-16037", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16037", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:gomeplus-h5-proxy_project:gomeplus-h5-proxy:*:*:*:*:*:node.js:*:*"]}], "nodejs": [{"lastseen": "2020-09-29T11:10:48", "bulletinFamily": "software", "cvelist": ["CVE-2017-16037"], "description": "## Overview\n\nAffected versions of `gomeplus-h5-proxy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.\n\nExample request:\n```\nGET /../../../../../../../../../../etc/passwd HTTP/1.1\nhost:foo\n```\n\n## Recommendation\n\nNo patch is available for this vulnerability.\n\nIt is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.\n\n## References\n\n- https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy", "modified": "2019-06-24T21:32:17", "published": "2017-05-22T21:32:25", "id": "NODEJS:350", "href": "https://www.npmjs.com/advisories/350", "type": "nodejs", "title": "Directory Traversal", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}]}