Miggo Logo

CVE-2017-16197: Directory Traversal in qinserve

N/A

CVSS Score

Basic Information

EPSS Score
0.53864%
Published
9/1/2020
Updated
9/7/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
qinservenpm>= 0.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path resolution in the request handling logic. Though exact code isn't available, the advisory explicitly states the server resolves relative paths without validation. In Node.js static servers, this typically occurs in the core request handler that maps URLs to filesystem paths. The lack of normalization/sanitization before passing to path resolution functions (like path.join()) would directly enable traversal. The high confidence comes from the vulnerability pattern matching classic path traversal flaws in simple static servers.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `qins*rv*` r*solv* r*l*tiv* *il* p*t*s, r*sultin* in * *ir**tory tr*v*rs*l vuln*r**ility. * m*li*ious **tor **n us* t*is vuln*r**ility to ****ss *il*s outsi** o* t** int*n*** *ir**tory root, w*i** m*y r*sult in t** *is*losur* o*

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* r*solution in t** r*qu*st **n*lin* lo*i*. T*ou** *x**t *o** isn't *v*il**l*, t** **visory *xpli*itly st*t*s t** s*rv*r r*solv*s r*l*tiv* p*t*s wit*out v*li**tion. In No**.js st*ti* s*rv*rs, t*is typi**lly o*