Skip to content

Conversation

@huntr-helper
Copy link

https://huntr.dev/users/alromh87 has fixed the Path Traversal vulnerability 🔨. alromh87 has been awarded $25 for fixing the vulnerability through the huntr bug bounty program 💵. Think you could fix a vulnerability like this?

Get involved at https://huntr.dev/

Q | A
Version Affected | ALL
Bug Fix | YES
Original Pull Request | 418sec#1
Vulnerability README | https://github.com/418sec/huntr/blob/master/bounties/npm/marscode/1/README.md

User Comments:

📊 Metadata *

marscode is a web editor created with monaco-editor, jquery file tree and nodejs file tree to read, write, edit, delete (CRUD) files.

Affected versions of this package are vulnerable to Directory Traversal.

Bounty URL: https://www.huntr.dev/bounties/1-npm-marscode/

⚙️ Description *

There is no path sanitization in the path provided making marscode vulnerable against path traversal through the ../ technique, leading to information exposure and file content disclosure.

💻 Technical Description *

Fixed by sanitizing any occurrence of ../, using regexp.

🐛 Proof of Concept (PoC) *

  1. Start the server
    node index.js
  2. Request private file from server
    curl -v --path-as-is http://127.0.0.1:8080/../../../../../../../../../../../etc/passwd
  3. /etc/passwd will be displayed.
    POCC

🔥 Proof of Fix (PoF) *

After fix Response code 400 Bad request is returned to user instead of restricted file content
Captura de pantalla de 2020-09-02 15-33-46

👍 User Acceptance Testing (UAT)

After fix functionality is unafected
Captura de pantalla de 2020-09-02 15-45-54

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants