{ "schema_version": "1.4.0", "id": "GHSA-q2qh-cgc2-qhr3", "modified": "2023-04-21T19:00:42Z", "published": "2018-07-27T17:07:50Z", "aliases": [ "CVE-2018-3712" ], "summary": "Directory Traversal in serve", "details": "Affected versions of `serve` do not properly handle `%2e` (.) and `%2f` (/) characters, and allow the, characters to be used in paths. This can be used to traverse the directory tree and list content of any directory the user running the process has access to.\n\nMitigating factors:\nThis vulnerability only allows listing of directory contents and does not allow reading of arbitrary files.\n\n\n## Recommendation\n\nUpdate to version 6.4.9 later.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "serve" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "6.4.9" } ] } ], "database_specific": { "last_known_affected_version_range": "<= 6.4.8" } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3712" }, { "type": "WEB", "url": "https://github.com/zeit/serve/pull/316" }, { "type": "WEB", "url": "https://github.com/vercel/serve/commit/6adad6881c61991da61ebc857857c53409544575" }, { "type": "WEB", "url": "https://hackerone.com/reports/307666" }, { "type": "PACKAGE", "url": "https://github.com/vercel/serve" } ], "database_specific": { "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:50:26Z", "nvd_published_at": null } }