Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade @saltcorn/server
to version 1.0.0-beta.14 or higher.
@saltcorn/server is a Server app for Saltcorn, open-source no-code platform
Affected versions of this package are vulnerable to Exposure of Information Through Directory Listing due to missing validations of the build_dir_name
parameter. This allows an attacker with admin permission to view files and directories on the filesystem.
Note: It is possible to only see file and directory names but not to download their content.
##Workaround
Users who are not able to upgrade to the fixed version are advised to resolve the buildDir
and check if it starts with ${rootFolder.location}/mobile_app
.
http://localhost:3000/admin/build-mobile-app/result?build_dir_name=/../../../../../../../../