Loading HuntDB...

GHSA-96qc-ghj4-rq27

GitHub Security Advisory

Directory Traversal in yttivy

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Affected versions of `yttivy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.

**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```

## Recommendation

No patch is available for this vulnerability.

It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.

Affected Packages

npm yttivy
Affected versions: 0.0.0

Related CVEs

Key Information

GHSA ID
GHSA-96qc-ghj4-rq27
Published
September 1, 2020 6:24 PM
Last Modified
September 13, 2023 8:25 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
yttivy
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 4, 2025 6:27 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.