Path traversal in socket.io-file - CVE-2020-15779

 

Path traversal in socket.io-file - CVE-2020-15779

Published: July 15, 2020 / Updated: October 10, 2020


Vulnerability identifier: #VU47493
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-15779
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
socket.io-file
Software vendor:
Hamrahpay Dev Team

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences passed via the "name"  option to socket.io-file::createFile. A remote attacker can send a specially crafted HTTP request and rename the uploaded file.

Successful exploitation of the vulnerability may allow remote code execution.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links