Path traversal in socket.io-file - CVE-2020-15779
Published: July 15, 2020 / Updated: October 10, 2020
socket.io-file
Hamrahpay Dev Team
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences passed via the "name" option to socket.io-file::createFile. A remote attacker can send a specially crafted HTTP request and rename the uploaded file.
Successful exploitation of the vulnerability may allow remote code execution.