Miggo Logo

GHSA-v86x-f47q-f7f4: Unauthorized File Access in atompm

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
9/11/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
atompmnpm< 0.8.20.8.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis of the provided patches shows that the vulnerability stems from improper path sanitization in the HTTP request handler for file downloads in 'httpwsd.js'. However, the critical code modifications occur within an anonymous callback function passed to _http.createServer(), which doesn't provide an explicit function name. While the patches add path validation checks (for '..' and ';'), the vulnerable code prior to patching existed in this anonymous handler. Since runtime profilers wouldn't capture a named function for this anonymous handler and no other named functions in the patches directly handle unsanitized paths without mitigation, we cannot confidently specify a named vulnerable function from the provided evidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*rsions o* `*tompm` prior to *.*.* *r* vuln*r**l* to Un*ut*oriz** *il* ****ss. T** p**k*** **ils to s*nitiz* r*l*tiv* p*t*s in t** URL *or *il* *ownlo**s, *llowin* *tt**k*rs to *ownlo** *r*itr*ry *il*s *rom t** syst*m. ## R**omm*n**tion Up*r*** t

Reasoning

T** *n*lysis o* t** provi*** p*t***s s*ows t**t t** vuln*r**ility st*ms *rom improp*r p*t* s*nitiz*tion in t** *TTP r*qu*st **n*l*r *or *il* *ownlo**s in '*ttpws*.js'. *ow*v*r, t** *riti**l *o** mo*i*i**tions o**ur wit*in *n *nonymous **ll***k *un*ti