CVE-2014-6394
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory.
Known Affected Software
9 configuration(s) from 3 vendor(s)
xcode
Version:
7.0
CPE:
cpe:2.3:a:apple:xcode:7.0:*:*:*:*:*:*:*
fedora
Version:
21
CPE:
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
fedora
Version:
20
CPE:
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
fedora
Version:
19
CPE:
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
node.js
Version:
0.8.2
CPE:
cpe:2.3:a:joyent:node.js:0.8.2:*:*:*:*:*:*:*
node.js
Version:
0.6.1
CPE:
cpe:2.3:a:joyent:node.js:0.6.1:*:*:*:*:*:*:*
node.js
Version:
0.8.0
CPE:
cpe:2.3:a:joyent:node.js:0.8.0:*:*:*:*:*:*:*
node.js
Version:
0.8.1
CPE:
cpe:2.3:a:joyent:node.js:0.8.1:*:*:*:*:*:*:*
node.js
Version:
0.6.3
CPE:
cpe:2.3:a:joyent:node.js:0.6.3:*:*:*:*:*:*:*
This vulnerability affects 9 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlcve@mitre.org
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.htmlcve@mitre.org
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.htmlcve@mitre.org
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.htmlcve@mitre.org
-
http://secunia.com/advisories/62170cve@mitre.org
-
http://www-01.ibm.com/support/docview.wss?uid=swg21687263cve@mitre.org
-
http://www.openwall.com/lists/oss-security/2014/09/24/1cve@mitre.org
-
http://www.openwall.com/lists/oss-security/2014/09/30/10cve@mitre.org
-
http://www.securityfocus.com/bid/70100cve@mitre.org
-
https://bugzilla.redhat.com/show_bug.cgi?id=1146063cve@mitre.org
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/96727cve@mitre.org
-
https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9acve@mitre.org Exploit
-
https://github.com/visionmedia/send/pull/59cve@mitre.org
-
https://nodesecurity.io/advisories/send-directory-traversalcve@mitre.org
-
https://support.apple.com/HT205217cve@mitre.org
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://secunia.com/advisories/62170af854a3a-2127-422b-91ae-364da2661108
-
http://www-01.ibm.com/support/docview.wss?uid=swg21687263af854a3a-2127-422b-91ae-364da2661108
-
http://www.openwall.com/lists/oss-security/2014/09/24/1af854a3a-2127-422b-91ae-364da2661108
-
http://www.openwall.com/lists/oss-security/2014/09/30/10af854a3a-2127-422b-91ae-364da2661108
-
http://www.securityfocus.com/bid/70100af854a3a-2127-422b-91ae-364da2661108
-
https://bugzilla.redhat.com/show_bug.cgi?id=1146063af854a3a-2127-422b-91ae-364da2661108
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/96727af854a3a-2127-422b-91ae-364da2661108
-
https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9aaf854a3a-2127-422b-91ae-364da2661108 Exploit
-
https://github.com/visionmedia/send/pull/59af854a3a-2127-422b-91ae-364da2661108
-
https://nodesecurity.io/advisories/send-directory-traversalaf854a3a-2127-422b-91ae-364da2661108
-
https://support.apple.com/HT205217af854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-22
Top 25 #6
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- Description
- The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can…
- Exploit Likelihood
- High
- Typical Severity
- High
- OWASP Top 10
- A01:2021-Broken Access Control
- Abstraction Level
- Base
Key Information
- Published Date
- October 08, 2014
