From ce27319df414fb5869fce125038660155855f2a2 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Thu, 9 Jun 2022 12:28:11 -0400 Subject: [PATCH] Enhancement: cves/2017/CVE-2017-14849.yaml by mp --- cves/2017/CVE-2017-14849.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2017/CVE-2017-14849.yaml b/cves/2017/CVE-2017-14849.yaml index 87a14fe679..df2cebb0a0 100644 --- a/cves/2017/CVE-2017-14849.yaml +++ b/cves/2017/CVE-2017-14849.yaml @@ -1,14 +1,14 @@ id: CVE-2017-14849 info: - name: Node.js 8.5.0 >=< 8.6.0 Directory Traversal + name: Node.js <8.6.0 - Directory Traversal author: Random_Robbie severity: high - description: Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to ".." handling was incompatible with the pathname validation used by unspecified community modules. + description: Node.js before 8.6.0 allows remote attackers to access unintended files because a change to ".." handling is incompatible with the pathname validation used by unspecified community modules. reference: - https://twitter.com/nodejs/status/913131152868876288 - https://nodejs.org/en/blog/vulnerability/september-2017-path-validation/ - - http://www.securityfocus.com/bid/101056 + - https://nvd.nist.gov/vuln/detail/CVE-2017-14849 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 @@ -29,3 +29,5 @@ requests: regex: - "root:.*:0:0:" part: body + +# Enhanced by mp on 2022/06/09