Skip to content

Instantly share code, notes, and snippets.

@JafarAkhondali
Created August 14, 2023 15:11
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save JafarAkhondali/528fe6c548b78f454911fb866b23f66e to your computer and use it in GitHub Desktop.
Save JafarAkhondali/528fe6c548b78f454911fb866b23f66e to your computer and use it in GitHub Desktop.
CVE-2023-39141 is reserved for this vulnerability
Project link:
https://github.com/ziahamza/webui-aria2/
Vulnerability type:
Path traversal
Root cause: This line https://github.com/ziahamza/webui-aria2/blob/109903f0e2774cf948698cd95a01f77f33d7dd2c/node-server.js#L10 accepts file name from URL input, without sanitizing it to be in the same directory.
PoC:
When `node-server.js` is used, an attacker can simply request files outside the serving path
`curl --path-as-is http://localhost:8888/../../../../../../../../../../../../../../../../../../../../etc/passwd`
Root cause: Attacker may read any file that the www user can read.
Vulnerable versions:
Right now all versions even latest commit "109903f0e2774cf948698cd95a01f77f33d7dd2c" are vulnerable.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment