Loading HuntDB...

GHSA-whcm-29f4-j4mx

GitHub Security Advisory

Directory Traversal in zwserver

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Affected versions of `zwserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.

**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```

## Recommendation

No patch is available for this vulnerability.

It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.

Affected Packages

npm zwserver
Affected versions: 0.0.0

Related CVEs

Key Information

GHSA ID
GHSA-whcm-29f4-j4mx
Published
September 1, 2020 4:56 PM
Last Modified
September 7, 2023 12:10 AM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
zwserver
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 4, 2025 6:27 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.