Miggo Logo

CVE-2014-10066: Directory Traversal in fancy-server

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.76375%
Published
8/31/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
fancy-servernpm< 0.1.40.1.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The key evidence comes from two patches:

  1. The replacement of 'path' with 'apathy' (a path resolution library with security focus) indicates the original path handling was insecure
  2. The renderArticle function directly processes filePath parameters and was modified in subsequent patches, suggesting it was part of the vulnerability surface While the exact path resolution code isn't visible in the patches, the combination of:
  • A known directory traversal vulnerability
  • Changes to path handling infrastructure
  • File path processing in renderArticle strongly indicates this function was responsible for unsanitized path handling. The vulnerability would manifest when user-supplied paths containing '../' are passed to this function without proper normalization.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*rsions *.*.* *n* **rli*r o* **n*y-s*rv*r *r* vuln*r**l* to * *ir**tory tr*v*rs*l *tt**k. St*n**r* *tt**k v**tors su** *s `../` will *llow *n *tt**k*r to r*** *il*s outsi** o* t** s*rv** *ir**tory. ## R**omm*n**tion Up*r*** to v*rsion *.*.* or

Reasoning

T** k*y *vi**n** *om*s *rom two p*t***s: *. T** r*pl***m*nt o* 'p*t*' wit* '*p*t*y' (* p*t* r*solution li*r*ry wit* s**urity *o*us) in*i**t*s t** ori*in*l p*t* **n*lin* w*s ins**ur* *. T** r*n**r*rti*l* *un*tion *ir**tly pro**ss*s *il*P*t* p*r*m*t*rs