VYPR
High severityNVD Advisory· Published May 29, 2018· Updated Sep 17, 2024

CVE-2018-3733

CVE-2018-3733

Description

crud-file-server node module before 0.9.0 suffers from a Path Traversal vulnerability due to incorrect validation of url, which allows a malicious user to read content of any file with known path.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
crud-file-servernpm
< 0.9.00.9.0

Affected products

1

Patches

1
4fc3b404f718

Fix canonicalization of directories

2 files changed · +2 2
  • crud-file-server.js+1 1 modified
    @@ -3,7 +3,7 @@ var fs = require('fs');
     // don't let users crawl up the folder structure by using a/../../../c/d
    
     var cleanUrl = function(url) { 
    
     	url = decodeURIComponent(url);
    
    -	while(url.indexOf('..').length > 0) { url = url.replace('..', ''); }
    
    +	while(url.indexOf('..') >= 0) { url = url.replace('..', ''); }
    
     	return url;
    
     };
    
     
    
    
  • package.json+1 1 modified
    @@ -1,6 +1,6 @@
     {
       "name": "crud-file-server",
    -  "version": "0.8.0",
    +  "version": "0.9.0",
       "description": "file server supporting basic create, read, update, & delete for any kind of file",
       "bin": {
         "crud-file-server": "./bin/crud-file-server"
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.