CVE-2017-16125: Directory Traversal in rtcmulticonnection-client
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67323%
CWE
Published
7/23/2018
Updated
9/11/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
rtcmulticonnection-client | npm | <= 1.0.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path sanitization when handling file requests. The example attack uses path traversal sequences in the URL, indicating the server-side file handling logic doesn't normalize paths before accessing files. In Node.js applications, this typically occurs in request handlers that map URLs directly to filesystem paths. The high confidence comes from the vulnerability pattern matching common path traversal flaws where user input isn't properly sanitized before filesystem operations.