Vulnerability Details : CVE-2014-6394
Potential exploit
visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory.
Products affected by CVE-2014-6394
- cpe:2.3:a:apple:xcode:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:a:joyent:node.js:*:*:*:*:*:*:*:*
- cpe:2.3:a:joyent:node.js:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:joyent:node.js:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:joyent:node.js:0.8.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-6394
4.84%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-6394
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-6394
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-6394
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.html
[SECURITY] Fedora 19 Update: nodejs-send-0.3.0-4.fc19
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/96727
Node.js lib/send.js directory traversal CVE-2014-6394 Vulnerability Report
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
Apple - Lists.apple.com
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html
[SECURITY] Fedora 20 Update: nodejs-send-0.3.0-4.fc20
-
https://github.com/visionmedia/send/pull/59
Insecure comparison by iliakan · Pull Request #59 · pillarjs/send · GitHub
-
https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a
Fix a path traversal issue when using root · pillarjs/send@9c6ca9b · GitHubExploit
-
https://support.apple.com/HT205217
About the security content of Xcode 7.0 - Apple Support
-
http://www-01.ibm.com/support/docview.wss?uid=swg21687263
IBM Security Bulletin: Security vulnerabilities in Node.js modules affect IBM Business Process Manager (BPM) Configuration Editor (CVE-2014-6394, CVE-2014-7191)
-
http://www.openwall.com/lists/oss-security/2014/09/30/10
oss-security - Re: CVE request: various NodeJS module vulnerabilities
-
https://bugzilla.redhat.com/show_bug.cgi?id=1146063
1146063 – (CVE-2014-6394) CVE-2014-6394 nodejs-send: directory traversal vulnerability
-
https://nodesecurity.io/advisories/send-directory-traversal
npm
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.html
[SECURITY] Fedora 21 Update: nodejs-send-0.3.0-4.fc21
-
http://www.securityfocus.com/bid/70100
Node.js 'lib/send.js' Directory Traversal Vulnerability
-
http://www.openwall.com/lists/oss-security/2014/09/24/1
oss-security - CVE request: various NodeJS module vulnerabilities
-
http://secunia.com/advisories/62170
Sign in
Jump to