Miggo Logo

CVE-2017-16093:
Directory Traversal in cyber-js

7.5

CVSS Score

Basic Information

EPSS Score
-
Published
7/27/2018
Updated
9/11/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
cyber-jsnpm<= 1.0.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory and available documentation do not provide specific code examples, commit diffs, or file paths for the cyber-js package. Without access to the actual implementation details, it is impossible to definitively identify the exact vulnerable functions with high confidence. Directory traversal vulnerabilities in HTTP servers typically involve improper path sanitization in request-handling logic, but the absence of concrete code or patch details prevents precise function identification.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `*y**r-js` r*solv* r*l*tiv* *il* p*t*s, r*sultin* in * *ir**tory tr*v*rs*l vuln*r**ility. * m*li*ious **tor **n us* t*is vuln*r**ility to ****ss *il*s outsi** o* t** int*n*** *ir**tory root, w*i** m*y r*sult in t** *is*losur* o*

Reasoning

T** **visory *n* *v*il**l* *o*um*nt*tion *o not provi** sp**i*i* *o** *x*mpl*s, *ommit *i**s, or *il* p*t*s *or t** *y**r-js p**k***. Wit*out ****ss to t** **tu*l impl*m*nt*tion **t*ils, it is impossi*l* to ***initiv*ly i**nti*y t** *x**t vuln*r**l*