sirv is vulnerable to Path Traversal
60
Medium Risk
Affected versions of this package are vulnerable to Directory Traversal due to improper path sanitization. An attacker could exploit this vulnerability by crafting a request containing relative path sequences (e.g., ../) to escape the intended serving directory. It could allow access to arbitrary files on the server's file system, potentially leading to the disclosure of sensitive information.
You are affected if you are using a version that falls within the vulnerable range.
sirv is vulnerable to Path Traversal in versions 0.2.5 - 3.0.1.
Upgrade the sirv library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant