Vulnerability Description
All versions of package easy-static-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the req.url user input that is passed to the server code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Easy-Static-Server Project | Easy-Static-Server | All versions |
Related Weaknesses (CWE)
References
- https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9ExploitThird Party Advisory
- https://github.com/cunjieliu/easyServer/blob/master/index.js%23L27Broken LinkThird Party Advisory
- https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539ExploitThird Party Advisory
- https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9ExploitThird Party Advisory
- https://github.com/cunjieliu/easyServer/blob/master/index.js%23L27Broken LinkThird Party Advisory
- https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539ExploitThird Party Advisory
FAQ
What is CVE-2022-25931?
CVE-2022-25931 is a vulnerability with a CVSS score of 7.5 (HIGH). All versions of package easy-static-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the req.url user input that is passed to the server c...
How severe is CVE-2022-25931?
CVE-2022-25931 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-25931?
Check the references section above for vendor advisories and patch information. Affected products include: Easy-Static-Server Project Easy-Static-Server.