GHSA-v86x-f47q-f7f4: Unauthorized File Access in atompm
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
9/11/2020
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
atompm | npm | < 0.8.2 | 0.8.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis of the provided patches shows that the vulnerability stems from improper path sanitization in the HTTP request handler for file downloads in 'httpwsd.js'. However, the critical code modifications occur within an anonymous callback function passed to _http.createServer()
, which doesn't provide an explicit function name. While the patches add path validation checks (for '..' and ';'), the vulnerable code prior to patching existed in this anonymous handler. Since runtime profilers wouldn't capture a named function for this anonymous handler and no other named functions in the patches directly handle unsanitized paths without mitigation, we cannot confidently specify a named vulnerable function from the provided evidence.