Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

High severity security issue #599

Open
JafarAkhondali opened this issue Mar 23, 2022 · 1 comment
Open

High severity security issue #599

JafarAkhondali opened this issue Mar 23, 2022 · 1 comment

Comments

@JafarAkhondali
Copy link

Hi, I've found a high severity security issue in this project.
Please draft a security issue here: https://github.com/ziahamza/webui-aria2/security/advisories/new (I don't have permission) and add me as collaborator, so I can fill details and even help in patching it.

@JafarAkhondali
Copy link
Author

JafarAkhondali commented Jul 27, 2023

Due to no response:
CVE-2023-39141 have been reserved for this vulnerability.

Vulnerability type:
Path traversal

Root cause: This line

filename = path.join(process.cwd(), "docs", uri);
accepts file name from URL input, without sanitizing it to be in the same directory.

PoC:
When node-server.js is used, an attacker can simply request files outside the serving path
curl --path-as-is http://localhost:8888/../../../../../../../../../../../../../../../../../../../../etc/passwd

Root cause: Attacker may read any file that the www user can read.

Vulnerable versions:
Right now all versions even latest commit "109903f0e2774cf948698cd95a01f77f33d7dd2c" are vulnerable.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant