Loading HuntDB...

GHSA-4vcm-qfxh-p6c3

GitHub Security Advisory

Directory Traversal in getcityapi.yoehoehne

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Affected versions of `getcityapi.yoehoehne` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.

**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```

## Recommendation

No patch is available for this vulnerability.

It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.

Affected Packages

npm getcityapi.yoehoehne
Affected versions: 0 (last affected: 0.0.1)

Related CVEs

Key Information

GHSA ID
GHSA-4vcm-qfxh-p6c3
Published
July 23, 2018 8:40 PM
Last Modified
September 11, 2023 11:14 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
getcityapi.yoehoehne
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 6, 2025 6:30 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.