Root Path Disclosure Affecting send package, versions <0.11.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.18% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Root Path Disclosure vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDnpm:send:20151103
  • published6 Nov 2015
  • disclosed3 Nov 2015
  • creditDinis Cruz

Introduced: 3 Nov 2015

CVE-2015-8859  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade send to version 0.11.1 or higher. If a direct dependency update is not possible, use snyk wizard to patch this vulnerability.

Overview

Send is a library for streaming files from the file system as an http response. It supports partial responses (Ranges), conditional-GET negotiation, high test coverage, and granular events which may be leveraged to take appropriate actions in your application or framework.

Affected versions of this package are vulnerable to a Root Path Disclosure.

CVSS Base Scores

version 3.1