CVE-2017-16105: Directory Traversal in serverwzl
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67352%
CWE
Published
9/1/2020
Updated
9/8/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
serverwzl | npm | >= 0.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path sanitization in the file-serving mechanism. While exact function names aren't available in public disclosures, the nature of directory traversal vulnerabilities in simple HTTP servers typically involves the core request handling logic that maps URL paths to filesystem paths without proper normalization or containment checks. The advisory explicitly states the package resolves relative paths insecurely, confirming this pattern. The high confidence comes from: 1) The vulnerability pattern matches classic path traversal flaws 2) Multiple sources confirm the exploit works via '../' sequences 3) The package's purpose as a simple server suggests direct path mapping without security controls.