CVE-2017-16198: Directory Traversal in ritp
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67306%
CWE
Published
8/6/2018
Updated
9/11/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ritp | npm | <= 1.0.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path resolution when handling user requests. Static file servers typically have a function that maps URL paths to filesystem paths. The advisory explicitly states the package resolves relative paths insecurely, and the example attack uses path traversal sequences. Without code inspection, we infer the core file-serving function (commonly named serveFile/handleRequest in Node.js servers) fails to properly sanitize input or validate resolved paths against the root directory. This matches CWE-22's pattern of insufficient path limitation.