Skip to content

Path Traversal in servey

Moderate severity GitHub Reviewed Published Jun 6, 2019 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm servey (npm)

Affected versions

< 3.1.0

Patched versions

3.1.0

Description

Versions of servey prior to 3.x are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.

Recommendation

Upgrade to the latest version

References

Reviewed Jun 6, 2019
Published to the GitHub Advisory Database Jun 6, 2019
Last updated Jan 9, 2023

Severity

Moderate

EPSS score

Weaknesses

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Learn more on MITRE.

CVE ID

No known CVE

GHSA ID

GHSA-rv49-54qp-fw42

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.