Miggo Logo

CVE-2019-5423:
Path Traversal in http-live-simulator

5

CVSS Score

Basic Information

EPSS Score
0.68708%
Published
4/8/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
http-live-simulatornpm< 1.0.61.0.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path sanitization when handling user input. While no patch code is available, the descriptions consistently indicate: 1) File access using user-controlled paths 2) Lack of normalization for relative paths. In Node.js HTTP servers, these patterns typically manifest in the core request handling and file serving functions. The medium confidence reflects inference from vulnerability patterns rather than direct patch analysis.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*rsions o* `*ttp-liv*-simul*tor` prior to *.*.* *r* vuln*r**l* to P*t* Tr*v*rs*l. *u* to insu**i*i*nt input s*nitiz*tion, *tt**k*rs **n ****ss s*rv*r *il*s *y usin* r*l*tiv* p*t*s. ## R**omm*n**tion Up*r*** to v*rsion *.*.*

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* s*nitiz*tion w**n **n*lin* us*r input. W*il* no p*t** *o** is *v*il**l*, t** **s*riptions *onsist*ntly in*i**t*: *) *il* ****ss usin* us*r-*ontroll** p*t*s *) L**k o* norm*liz*tion *or r*l*tiv* p*t*s. In `No