CVE-2017-16214: Directory Traversal in peiserver
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67352%
CWE
Published
9/1/2020
Updated
9/11/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
peiserver | npm | >= 0.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path resolution when handling user requests. The example attack uses path traversal sequences in the URL, indicating the request handling function
directly maps URL paths to filesystem paths without validation. In Node.js
static servers, this is typically done in the core request handler (often named serveFile
or similar) that resolves paths using methods like path.join()
without checking for parent directory traversal attempts. The high confidence comes from the vulnerability pattern matching classic path traversal flaws in static file
servers.