分析待定CVE-2014-6394

CVE-2014-6394: Directory Traversal in Send Node.js Module

平台

nodejs

组件

send

修复版本

0.8.4

CVE-2014-6394 describes a directory traversal vulnerability present in versions 0.8.3 and earlier of the send Node.js module. This flaw allows attackers to bypass intended file access restrictions, potentially exposing sensitive data. The vulnerability stems from an improper handling of the root option, enabling access to files outside the designated directory. Updating to version 0.8.4 or later resolves this issue.

影响与攻击场景翻译中…

Successful exploitation of CVE-2014-6394 allows an attacker to read arbitrary files on the server, provided they can influence the application's request. This could include configuration files, source code, or other sensitive data. The impact is amplified if the application is running with elevated privileges, as the attacker could potentially gain access to system resources. While the CVSS score is LOW, the potential for data exposure and the ease of exploitation make this a significant concern, particularly in applications that rely heavily on the send module for serving static assets. The ability to bypass the intended root directory restriction is a critical security failure.

利用背景翻译中…

CVE-2014-6394 was published in 2017. There is no indication of active exploitation campaigns targeting this vulnerability. The EPSS score is likely low due to the age of the vulnerability and the lack of public exploits. No known KEV listing. Public proof-of-concept exploits are not widely available, but the vulnerability is conceptually straightforward to exploit.

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
NextGuard10–15% 仍然脆弱

EPSS

4.84% (89% 百分位)

时间线

  1. 发布日期
  2. 修改日期
  3. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2014-6394 is to upgrade the send module to version 0.8.4 or later. This version includes a fix that properly restricts file access based on the root option. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests that attempt to traverse directories. Specifically, look for patterns in the request path that attempt to escape the intended root directory. Thoroughly test any configuration changes or WAF rules to ensure they do not disrupt legitimate application functionality. After upgrading, confirm the fix by attempting a directory traversal request and verifying that access is denied.

修复方法翻译中…

暂无官方补丁。请查找临时解决方案或持续关注更新。

常见问题翻译中…

What is CVE-2014-6394 — Directory Traversal in Send Node.js Module?

CVE-2014-6394 is a directory traversal vulnerability affecting versions 0.8.3 and earlier of the Send Node.js module, allowing attackers to bypass intended file access restrictions.

Am I affected by CVE-2014-6394 in Send Node.js Module?

You are affected if your application uses Send version 0.8.3 or earlier. Check your package.json or use npm list send to determine your version.

How do I fix CVE-2014-6394 in Send Node.js Module?

Upgrade the Send module to version 0.8.4 or later using npm install send@latest or by updating your package.json and running npm install.

Is CVE-2014-6394 being actively exploited?

There is no evidence of active exploitation campaigns targeting CVE-2014-6394, but the vulnerability remains a potential risk.

Where can I find the official Send advisory for CVE-2014-6394?

While a dedicated advisory may not exist, refer to the NVD entry for CVE-2014-6394 for more information: https://nvd.nist.gov/vuln/detail/CVE-2014-6394

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

live免费扫描

立即试用 — 无需账户

上传任何清单文件 (composer.lock, package-lock.json, WordPress 插件列表…) 或粘贴您的组件列表。您立即获得一份漏洞报告。上传文件只是开始:拥有账户后,您将获得持续监控、Slack/电子邮件警报、多项目和白标报告。

手动扫描Slack/邮件提醒持续监控白标报告

拖放您的依赖文件

composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...