{"id":"GHSA-xj3h-vc9j-j823","summary":"Directory Traversal in nodeaaaaa","details":"Affected versions of `nodeaaaaa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.\n\n**Example request:**\n```http\nGET /../../../../../../../../../../etc/passwd HTTP/1.1\nhost:foo\n```\n\n\n## Recommendation\n\nNo patch is available for this vulnerability.\n\nIt is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","aliases":["CVE-2017-16223"],"modified":"2023-11-08T03:59:12.384386Z","published":"2018-07-23T20:39:32Z","database_specific":{"severity":"HIGH","nvd_published_at":null,"github_reviewed":true,"github_reviewed_at":"2020-06-16T22:03:32Z","cwe_ids":["CWE-22"]},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16223"},{"type":"WEB","url":"https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeaaaaa"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-xj3h-vc9j-j823"},{"type":"WEB","url":"https://www.npmjs.com/advisories/446"}],"affected":[{"package":{"name":"nodeaaaaa","ecosystem":"npm","purl":"pkg:npm/nodeaaaaa"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"last_affected":"1.3.0"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/07/GHSA-xj3h-vc9j-j823/GHSA-xj3h-vc9j-j823.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}