Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12ODM0LXJodjQtNjVtM84AA2Mj
static-server Path Traversal vulnerability
All versions of the package static-server are vulnerable to Directory Traversal due to improper input sanitization passed via the validPath function of server.js.
Permalink: https://github.com/advisories/GHSA-v834-rhv4-65m3JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12ODM0LXJodjQtNjVtM84AA2Mj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Percentage: 0.00133
EPSS Percentile: 0.49501
Identifiers: GHSA-v834-rhv4-65m3, CVE-2023-26152
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-26152
- https://gist.github.com/lirantal/1f7021703a2065ecaf9ec9e06a3a346d
- https://security.snyk.io/vuln/SNYK-JS-STATICSERVER-5722341
- https://github.com/nbluis/static-server/blob/master/server.js#L218-L223
- https://github.com/advisories/GHSA-v834-rhv4-65m3
Blast Radius: 29.8
Affected Packages
npm:static-server
Dependent packages: 378Dependent repositories: 9,376
Downloads: 102,512 last month
Affected Version Ranges: <= 2.2.1
No known fixed version
All affected versions: 1.0.0, 1.0.1, 1.0.2, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.1.0, 2.2.0, 2.2.1