Bug 899320 (CVE-2014-6394) - VUL-0: CVE-2014-6394: nodejs-send: directory traversal vulnerability
Summary: VUL-0: CVE-2014-6394: nodejs-send: directory traversal vulnerability
Status: RESOLVED INVALID
Alias: CVE-2014-6394
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other openSUSE 13.2
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Marguerite Su
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/108689/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-10-01 06:52 UTC by Marcus Meissner
Modified: 2014-10-02 12:05 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2014-10-01 06:52:27 UTC
When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory. For example, static(_dirname + '/public') would allow access to _dirname + '/public-restricted'.

Upstream commit: https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a
Corresponding pull request: https://github.com/visionmedia/send/pull/59
CVE request: http://seclists.org/oss-sec/2014/q3/640
Comment 1 Swamp Workflow Management 2014-10-01 12:08:24 UTC
bugbot adjusting priority
Comment 2 Marguerite Su 2014-10-02 12:05:26 UTC
Hi,

openSUSE product series didn't have the package "nodejs-send".