Bug 1146063 (CVE-2014-6394) - CVE-2014-6394 nodejs-send: directory traversal vulnerability
Summary: CVE-2014-6394 nodejs-send: directory traversal vulnerability
Status: CLOSED ERRATA
Alias: CVE-2014-6394
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=low,public=20140912,reported=2...
Keywords: Security
Depends On: 1146064 1146065
Blocks: 1146067
TreeView+ depends on / blocked
 
Reported: 2014-09-24 11:39 UTC by Vasyl Kaigorodov
Modified: 2019-06-08 20:11 UTC (History)
15 users (show)

(edit)
Clone Of:
(edit)
Last Closed: 2014-10-30 05:31:56 UTC


Attachments (Terms of Use)

Description Vasyl Kaigorodov 2014-09-24 11:39:25 UTC
When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory. For example, static(_dirname + '/public') would allow access to _dirname + '/public-restricted'.

Upstream commit: https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a
Corresponding pull request: https://github.com/visionmedia/send/pull/59
CVE request: http://seclists.org/oss-sec/2014/q3/640

Comment 1 Vasyl Kaigorodov 2014-09-24 11:40:06 UTC
Created nodejs-send tracking bugs for this issue:

Affects: fedora-all [bug 1146064]
Affects: epel-all [bug 1146065]

Comment 2 Fedora Update System 2014-09-29 04:03:44 UTC
nodejs-send-0.3.0-4.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 3 Fedora Update System 2014-10-06 05:00:32 UTC
nodejs-send-0.3.0-4.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 4 Fedora Update System 2014-10-06 05:06:06 UTC
nodejs-send-0.3.0-4.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.