Directory Traversal Affecting larvitbase-api package, versions <0.5.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.1% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-LARVITBASEAPI-459899
  • published 20 Aug 2019
  • disclosed 20 Aug 2019
  • credit Vasiliy Ermilov

How to fix?

Upgrade larvitbase-api to version 0.5.5 or higher.

Overview

larvitbase-api is a part of larbitbase - a scaled down version of Express.

Affected versions of this package are vulnerable to Directory Traversal. The server dynamically loads some parts of the code. As long as the path to required module is partially depend on the URL, an attacker can cause code to load that was not intended to run on the server.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.4 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Changed
  • Confidentiality (C)
    Low
  • Integrity (I)
    Low
  • Availability (A)
    None
Expand this section

NVD

7.5 high