-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2017-16224 - Medium Severity Vulnerability
Vulnerable Library - st-0.2.4.tgz
A module for serving static files. Does etags, caching, etc.
Library home page: https://registry.npmjs.org/st/-/st-0.2.4.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/st/package.json
Dependency Hierarchy:
- ❌ st-0.2.4.tgz (Vulnerable Library)
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Vulnerability Details
st is a module for serving static files. An attacker is able to craft a request that results in an HTTP 301 (redirect) to an entirely different domain. A request for: http://some.server.com//nodesecurity.org/%2e%2e would result in a 301 to //nodesecurity.org/%2e%2e which most browsers treat as a proper redirect as // is translated into the current schema being used. Mitigating factor: In order for this to work, st must be serving from the root of a server (/) rather than the typical sub directory (/static/) and the redirect URL will end with some form of URL encoded .. ("%2e%2e", "%2e.", ".%2e").
Publish Date: 2018-06-07
URL: CVE-2017-16224
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16224
Release Date: 2018-06-07
Fix Resolution: 1.2.2
Step up your Open Source Security Game with WhiteSource here