Versions of st prior to 0.2.5 are affected by a directory traversal vulnerability. Vulnerable versions fail to properly handle URL encoded dots, which caused %2e to be interpreted as . by the filesystem, resulting the potential for an attacker to read sensitive files on the server.
Recommendation
Update to version 0.2.5 or later.
References:- https://github.com/isaacs/st#security-status
- https://www.npmjs.com/advisories/36
- https://nvd.nist.gov/vuln/detail/CVE-2014-3744
- https://github.com/isaacs/st
- http://www.openwall.com/lists/oss-security/2014/05/13/1
- http://www.openwall.com/lists/oss-security/2014/05/15/2
- http://www.securityfocus.com/bid/67389
- https://github.com/advisories/GHSA-69rr-wvh9-6c4q