cve/2023/CVE-2023-26126.md
2024-06-22 09:37:59 +00:00

19 lines
744 B
Markdown

### [CVE-2023-26126](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26126)
![](https://img.shields.io/static/v1?label=Product&message=m.static&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Directory%20Traversal&color=brighgreen)
### Description
All versions of the package m.static are vulnerable to Directory Traversal due to improper input sanitization of the path being requested via the requestFile function.
### POC
#### Reference
- https://gist.github.com/lirantal/dcb32c11ce87f5aafd2282b90b4dc998
- https://security.snyk.io/vuln/SNYK-JS-MSTATIC-3244915
#### Github
No PoCs found on GitHub currently.