High severityNVD Advisory· Published May 29, 2018· Updated Sep 17, 2024
CVE-2018-3733
CVE-2018-3733
Description
crud-file-server node module before 0.9.0 suffers from a Path Traversal vulnerability due to incorrect validation of url, which allows a malicious user to read content of any file with known path.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
crud-file-servernpm | < 0.9.0 | 0.9.0 |
Affected products
1- Range: Versions before 0.9.0
Patches
14fc3b404f718Fix canonicalization of directories
2 files changed · +2 −2
crud-file-server.js+1 −1 modified@@ -3,7 +3,7 @@ var fs = require('fs'); // don't let users crawl up the folder structure by using a/../../../c/d var cleanUrl = function(url) { url = decodeURIComponent(url); - while(url.indexOf('..').length > 0) { url = url.replace('..', ''); } + while(url.indexOf('..') >= 0) { url = url.replace('..', ''); } return url; };
package.json+1 −1 modified@@ -1,6 +1,6 @@ { "name": "crud-file-server", - "version": "0.8.0", + "version": "0.9.0", "description": "file server supporting basic create, read, update, & delete for any kind of file", "bin": { "crud-file-server": "./bin/crud-file-server"
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-vfp9-gwrh-wq9gghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-3733ghsaADVISORY
- github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82ghsax_refsource_MISCWEB
- hackerone.com/reports/310690ghsax_refsource_MISCWEB
- www.npmjs.com/advisories/1003ghsaWEB
News mentions
0No linked articles in our index yet.