Directory Traversal

2017-07-07T16:49:36
ID NODEJS:434
Type nodejs
Reporter Liang Gong
Modified 2019-06-24T21:43:38

Description

Overview

Affected versions of qinserve resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.

Example request: GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo

Recommendation

No patch is available for this vulnerability.

It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.

References

  • https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/qinserve