Miggo Logo

CVE-2017-16105: Directory Traversal in serverwzl

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.67352%
Published
9/1/2020
Updated
9/8/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
serverwzlnpm>= 0.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path sanitization in the file-serving mechanism. While exact function names aren't available in public disclosures, the nature of directory traversal vulnerabilities in simple HTTP servers typically involves the core request handling logic that maps URL paths to filesystem paths without proper normalization or containment checks. The advisory explicitly states the package resolves relative paths insecurely, confirming this pattern. The high confidence comes from: 1) The vulnerability pattern matches classic path traversal flaws 2) Multiple sources confirm the exploit works via '../' sequences 3) The package's purpose as a simple server suggests direct path mapping without security controls.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `s*rv*rwzl` r*solv* r*l*tiv* *il* p*t*s, r*sultin* in * *ir**tory tr*v*rs*l vuln*r**ility. * m*li*ious **tor **n us* t*is vuln*r**ility to ****ss *il*s outsi** o* t** int*n*** *ir**tory root, w*i** m*y r*sult in t** *is*losur* o*

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* s*nitiz*tion in t** *il*-s*rvin* m****nism. W*il* *x**t *un*tion n*m*s *r*n't *v*il**l* in pu*li* *is*losur*s, t** n*tur* o* *ir**tory tr*v*rs*l vuln*r**iliti*s in simpl* *TTP s*rv*rs typi**lly involv*s t**