CVE-2017-16101: Directory Traversal in serverwg
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67352%
CWE
Published
9/1/2020
Updated
9/7/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
serverwg | npm | >= 0.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
While the exact code isn't available, the vulnerability pattern strongly indicates: 1) A file-serving function
directly uses unsanitized URL paths 2) Absence of path normalization (via methods like path.resolve()
in Node.js
) 3) Lack of containment checks to prevent escaping the web root. This is a classic directory traversal vulnerability pattern in simple HTTP
servers that map URLs directly to filesystem paths without proper sanitization.