Miggo Logo

CVE-2023-46496: Directory Traversal in evershop

8.3

CVSS Score
3.1

Basic Information

EPSS Score
0.63376%
Published
12/8/2023
Updated
12/13/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
@evershop/evershopnpm< 1.0.0-rc.81.0.0-rc.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

  1. The vulnerability description explicitly mentions the DELETE function in api/files endpoint as the attack vector
  2. Checkmarx analysis specifically identifies 'unlinkSync' in deleteFile.js as the vulnerable function with improper path validation
  3. The GitHub pull request #338 that fixed this vulnerability includes a commit (5aa38b0) with message 'Fix Relative Path Traversal issue'
  4. Path traversal vulnerabilities typically occur when user input is directly used in file operations without proper sanitization
  5. The CWE-22 classification confirms this is a path handling issue in file operations

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ir**tory Tr*v*rs*l vuln*r**ility in *v*rS*op NPM v*rsions ***or* v.*.*.*-r*.* *llows * r*mot* *tt**k*r to o*t*in s*nsitiv* in*orm*tion vi* * *r**t** r*qu*st to t** **L*T* *un*tion in *pi/*il*s *n*point.

Reasoning

*. T** vuln*r**ility **s*ription *xpli*itly m*ntions t** **L*T* *un*tion in *pi/*il*s *n*point *s t** *tt**k v**tor *. ****km*rx *n*lysis sp**i*i**lly i**nti*i*s 'unlinkSyn*' in **l*t**il*.js *s t** vuln*r**l* *un*tion wit* improp*r p*t* v*li**tion *