Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS12ODM0LXJodjQtNjVtM84AA2Mj

static-server Path Traversal vulnerability

All versions of the package static-server are vulnerable to Directory Traversal due to improper input sanitization passed via the validPath function of server.js.

Permalink: https://github.com/advisories/GHSA-v834-rhv4-65m3
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12ODM0LXJodjQtNjVtM84AA2Mj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: about 1 year ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS Percentage: 0.00133
EPSS Percentile: 0.49501

Identifiers: GHSA-v834-rhv4-65m3, CVE-2023-26152
References: Repository: https://github.com/nbluis/static-server
Blast Radius: 29.8

Affected Packages

npm:static-server
Dependent packages: 378
Dependent repositories: 9,376
Downloads: 102,512 last month
Affected Version Ranges: <= 2.2.1
No known fixed version
All affected versions: 1.0.0, 1.0.1, 1.0.2, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.1.0, 2.2.0, 2.2.1