Miggo Logo

CVE-2017-16153: Directory Traversal in gaoxuyan

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.67708%
Published
9/1/2020
Updated
9/11/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
gaoxuyannpm>= 0.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path sanitization when processing user-supplied URLs. While the exact implementation details aren't visible, the nature of directory traversal vulnerabilities in Node.js typically involves: 1) A file-serving endpoint that takes URL paths directly 2) Use of raw path concatenation (e.g., __dirname + req.url) 3) Lack of normalization checks using path.resolve() or equivalent. The high confidence comes from the documented attack pattern (../../ sequences in URLs) and the CWE-22 classification, which directly maps to this type of unsanitized path handling.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `**oxuy*n` r*solv* r*l*tiv* *il* p*t*s, r*sultin* in * *ir**tory tr*v*rs*l vuln*r**ility. * m*li*ious **tor **n us* t*is vuln*r**ility to ****ss *il*s outsi** o* t** int*n*** *ir**tory root, w*i** m*y r*sult in t** *is*losur* o*

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* s*nitiz*tion w**n pro**ssin* us*r-suppli** URLs. W*il* t** *x**t impl*m*nt*tion **t*ils *r*n't visi*l*, t** n*tur* o* *ir**tory tr*v*rs*l vuln*r**iliti*s in No**.js typi**lly involv*s: *) * *il*-s*rvin* *n*p