cve/2022/CVE-2022-25931.md

19 lines
800 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-25931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25931)
![](https://img.shields.io/static/v1?label=Product&message=easy-static-server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Directory%20Traversal&color=brighgreen)
### Description
All versions of package easy-static-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the req.url user input that is passed to the server code.
### POC
#### Reference
- https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9
- https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539
#### Github
No PoCs found on GitHub currently.