hostr is a simple web server that serves up the contents of the current directory. There is a directory traversal vulnerability in hostr 2.3.5 and earlier that allows an attacker to read files outside the current directory by sending `../` in the url path for GET requests.
References
Link | Resource |
---|---|
https://github.com/henrytseng/hostr/issues/8 | Issue Tracking Third Party Advisory |
https://nodesecurity.io/advisories/303 | Third Party Advisory |
https://github.com/henrytseng/hostr/issues/8 | Issue Tracking Third Party Advisory |
https://nodesecurity.io/advisories/303 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/henrytseng/hostr/issues/8 - Issue Tracking, Third Party Advisory | |
References | () https://nodesecurity.io/advisories/303 - Third Party Advisory |
Information
Published : 2018-06-04 19:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-16029
Mitre link : CVE-2017-16029
CVE.ORG link : CVE-2017-16029
JSON object : View
Products Affected
hostr_project
- hostr
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')