Miggo Logo

CVE-2017-16214: Directory Traversal in peiserver

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.67352%
Published
9/1/2020
Updated
9/11/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
peiservernpm>= 0.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path resolution when handling user requests. The example attack uses path traversal sequences in the URL, indicating the request handling function directly maps URL paths to filesystem paths without validation. In Node.js static servers, this is typically done in the core request handler (often named serveFile or similar) that resolves paths using methods like path.join() without checking for parent directory traversal attempts. The high confidence comes from the vulnerability pattern matching classic path traversal flaws in static file servers.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `p*is*rv*r` r*solv* r*l*tiv* *il* p*t*s, r*sultin* in * *ir**tory tr*v*rs*l vuln*r**ility. * m*li*ious **tor **n us* t*is vuln*r**ility to ****ss *il*s outsi** o* t** int*n*** *ir**tory root, w*i** m*y r*sult in t** *is*losur* o*

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* r*solution w**n **n*lin* us*r r*qu*sts. T** *x*mpl* *tt**k us*s p*t* tr*v*rs*l s*qu*n**s in t** URL, in*i**tin* t** r*qu*st **n*lin* `*un*tion` *ir**tly m*ps URL p*t*s to *il*syst*m p*t*s wit*out v*li**tion.