Miggo Logo

CVE-2023-39141: webui-aria2 Path Traversal vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.99248%
Published
8/22/2023
Updated
3/1/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
webui-aria2npm<= 1.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from line 10 in node-server.js where user-controlled URI input is directly used to construct file paths without proper sanitization. The path.join() operation combined with unsanitized URI parameters allows directory traversal attacks. The code subsequently serves files from the constructed path without verifying if it remains within the intended 'docs' directory. This matches the CWE-22 description and the PoC demonstrating access to /etc/passwd confirms the exploitability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

w**ui-*ri** *ommit ***** w*s *is*ov*r** to *ont*in * p*t* tr*v*rs*l vuln*r**ility.

Reasoning

T** vuln*r**ility st*ms *rom lin* ** in no**-s*rv*r.js w**r* us*r-*ontroll** URI input is *ir**tly us** to *onstru*t *il* p*t*s wit*out prop*r s*nitiz*tion. T** p*t*.join() op*r*tion *om*in** wit* uns*nitiz** URI p*r*m*t*rs *llows *ir**tory tr*v*rs*l