GHSA-9h4g-27m8-qjrg

Suggest an improvement
Source
https://github.com/advisories/GHSA-9h4g-27m8-qjrg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/07/GHSA-9h4g-27m8-qjrg/GHSA-9h4g-27m8-qjrg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9h4g-27m8-qjrg
Aliases
  • CVE-2020-15779
Published
2020-07-07T19:24:47Z
Modified
2023-11-08T04:02:38.027602Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Path Traversal in socket.io-file
Details

All versions of socket.io-file are vulnerable to Path Traversal. The package fails to sanitize user input and uses it to generate the file upload paths. The socket.io-file::createFile message contains a name option that is passed directly to path.join(). It is possible to upload files to arbitrary folders on the server by sending relative paths on the name value, such as ../../test.js. The uploadDir and rename options can be used to define the file upload path.

Database specific
{
    "nvd_published_at": null,
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-22"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2020-07-07T19:23:52Z"
}
References

Affected packages

npm / socket.io-file

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.0.31