Skip to content

Path Traversal in superstatic

High severity GitHub Reviewed Published Jul 27, 2018 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm superstatic (npm)

Affected versions

< 5.0.2

Patched versions

5.0.2

Description

Affected of superstatic are vulnerable to path traversal when used on Windows.

Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize \\ to / in paths on all platforms (a known example being Node.js v9.9.0).

Recommendation

Update to version 5.0.2 or later.

References

Published to the GitHub Advisory Database Jul 27, 2018
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

High

EPSS score

Weaknesses

Improper Handling of URL Encoding (Hex Encoding)

The product does not properly handle when all or part of an input has been URL encoded. Learn more on MITRE.

CVE ID

No known CVE

GHSA ID

GHSA-wm77-q74p-5763

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.