CVE-2023-46496: Directory Traversal in evershop
8.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.63376%
CWE
Published
12/8/2023
Updated
12/13/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| @evershop/evershop | npm | < 1.0.0-rc.8 | 1.0.0-rc.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- The vulnerability description explicitly mentions the DELETE function in api/files endpoint as the attack vector
- Checkmarx analysis specifically identifies 'unlinkSync' in deleteFile.js as the vulnerable function with improper path validation
- The GitHub pull request #338 that fixed this vulnerability includes a commit (5aa38b0) with message 'Fix Relative Path Traversal issue'
- Path traversal vulnerabilities typically occur when user input is directly used in file operations without proper sanitization
- The CWE-22 classification confirms this is a path handling issue in file operations