cve/2023/CVE-2023-26111.md

21 lines
978 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-26111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26111)
![](https://img.shields.io/static/v1?label=Product&message=%40nubosoftware%2Fnode-static&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=node-static&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Directory%20Traversal&color=brighgreen)
### Description
All versions of the package @nubosoftware/node-static; all versions of the package node-static are vulnerable to Directory Traversal due to improper file path sanitization in the startsWith() method in the servePath function.
### POC
#### Reference
- https://gist.github.com/lirantal/c80b28e7bee148dc287339cb483e42bc
- https://security.snyk.io/vuln/SNYK-JS-NODESTATIC-3149928
- https://security.snyk.io/vuln/SNYK-JS-NUBOSOFTWARENODESTATIC-3149927
#### Github
No PoCs found on GitHub currently.