CVE-2018-3715:
Path Traversal in glance
6.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
7/26/2018
Updated
1/31/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
glance | npm | < 3.0.4 | 3.0.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The key evidence comes from the commit diff showing the vulnerability was fixed by adding a path validation check in serveRequest. The added code explicitly checks if request.fullPath starts with the configured directory (self.dir), which was missing in vulnerable versions. This function handles core request processing and path resolution, making it the logical point where path traversal would occur when unvalidated. The direct correlation between the vulnerability description (lack of path validation) and the patched code confirms this as the vulnerable function.