High severityNVD Advisory· Published Jun 7, 2018· Updated Sep 17, 2024
CVE-2017-16130
CVE-2017-16130
Description
exxxxxxxxxxx is an Http eX Frame Google Style JavaScript Guide. exxxxxxxxxxx is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Accessible files are restricted to those with a file extension. Files with no extension such as /etc/passwd throw an error.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
exxxxxxxxxxxnpm | <= 1.0.2 | — |
Affected products
1- Range: All versions
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-pq5x-rprq-8jrjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-16130ghsaADVISORY
- github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxxghsax_refsource_MISCWEB
- nodesecurity.io/advisories/478mitrex_refsource_MISC
- www.npmjs.com/advisories/478ghsaWEB
News mentions
0No linked articles in our index yet.