{ "schema_version": "1.4.0", "id": "GHSA-rwv8-jvff-jq28", "modified": "2023-01-31T01:37:12Z", "published": "2018-07-18T21:20:30Z", "aliases": [ "CVE-2018-3731" ], "summary": "Path Traversal in public", "details": "Versions of `public` before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user.\n\n\n## Recommendation\n\nUpdate to version 0.1.3 or later.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "public" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "0.1.3" } ] } ], "database_specific": { "last_known_affected_version_range": "<= 0.1.2" } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3731" }, { "type": "WEB", "url": "https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2" }, { "type": "WEB", "url": "https://hackerone.com/reports/312918" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-rwv8-jvff-jq28" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/571" } ], "database_specific": { "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:56:15Z", "nvd_published_at": "2018-06-07T02:29:00Z" } }