Miggo Logo

CVE-2017-16154: Directory Traversal in earlybird

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.67352%
Published
9/1/2020
Updated
9/12/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
earlybirdnpm>= 0.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path resolution when handling user-controlled input. While the exact code isn't available, the pattern matches common path traversal vulnerabilities where: 1) User-supplied paths (URLs) are directly concatenated with a base directory 2) No validation checks for path traversal sequences ('../') 3) No use of secure path resolution methods (like path.resolve with proper base constraints). The high confidence comes from the vulnerability description explicitly stating the package resolves relative paths insecurely, and the PoC showing classic traversal payloads in URLs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `**rly*ir*` r*solv* r*l*tiv* *il* p*t*s, r*sultin* in * *ir**tory tr*v*rs*l vuln*r**ility. * m*li*ious **tor **n us* t*is vuln*r**ility to ****ss *il*s outsi** o* t** int*n*** *ir**tory root, w*i** m*y r*sult in t** *is*losur* o*

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* r*solution w**n **n*lin* us*r-*ontroll** input. W*il* t** *x**t *o** isn't *v*il**l*, t** p*tt*rn m*t***s *ommon p*t* tr*v*rs*l vuln*r**iliti*s w**r*: *) Us*r-suppli** p*t*s (URLs) *r* *ir**tly *on**t*n*t**