Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-5688 PoC — Joyent Node.js Geddy 目录遍历漏洞

Source
Associated Vulnerability
Title:Joyent Node.js Geddy 目录遍历漏洞 (CVE-2015-5688)
Description:Joyent Node.js是美国Joyent公司的一套建立在Google V8 JavaScript引擎之上的网络应用平台。Geddy是其中的一个前端框架。 Joyent Node.js Geddy 13.0.7及之前版本的lib/app/index.js文件中存在目录遍历漏洞。远程攻击者可借助默认URI的PATH_INFO值中的‘..%2f’字符串利用该漏洞读取任意文件。
Description
Geddy prior to version 13.0.8 contains a directory traversal vulnerability in lib/app/index.js  that allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.
File Snapshot

id: CVE-2015-5688 info: name: Geddy <13.0.8 - Local File Inclusion author: pikpikcu severity: ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.