ID

VAR-201410-0935


CVE

CVE-2014-6394


TITLE

Node.js for visionmedia send Vulnerable to restricted directory access

Trust: 0.8

sources: JVNDB: JVNDB-2014-004624

DESCRIPTION

visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory. Node.js is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to create or overwrite arbitrary files in the context of the application. This may aid in further attacks. Versions prior to Node.js 0.8.4 are vulnerable. Joyent Node.js is a set of network application platforms built on the Google V8 JavaScript engine by the American Joyent company. The platform is mainly used to build highly scalable applications and write connection code that can handle tens of thousands of connections to a physical machine at the same time. A remote attacker could exploit this vulnerability to access restricted directories. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-09-16-2 Xcode 7.0 Xcode 7.0 is now available and addresses the following: DevTools Available for: OS X Yosemite v10.10.4 or later Impact: An attacker may be able to bypass access restrictions Description: An API issue existed in the apache configuration. This issue was addressed by updating header files to use the latest version. CVE-ID CVE-2015-3185 : Branko Aibej of the Apache Software Foundation IDE Xcode Server Available for: OS X Yosemite 10.10 or later Impact: An attacker may be able to access restricted parts of the filesystem Description: A comparison issue existed in the node.js send module prior to version 0.8.4. This issue was addressed by upgrading to version 0.12.3. CVE-ID CVE-2014-6394 : Ilya Kantor IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilties in OpenSSL Description: Multiple vulnerabilties existed in the node.js OpenSSL module prior to version 1.0.1j. These issues were addressed by updating openssl to version 1.0.1j. CVE-ID CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: An attacker with a privileged network position may be able to inspect traffic to Xcode Server Description: Connections to Xcode Server may have been made without encryption. This issue was addressed through improved network connection logic. CVE-ID CVE-2015-5910 : an anonymous researcher IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: Build notifications may be sent to unintended recipients Description: An access issue existed in the handling of repository email lists. This issue was addressed through improved validation. CVE-ID CVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of Anchorfree subversion Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilities existed in svn versions prior to 1.7.19 Description: Multiple vulnerabilities existed in svn versions prior to 1.7.19. These issues were addressed by updating svn to version 1.7.20. CVE-ID CVE-2015-0248 CVE-2015-0251 Xcode 7.0 may be obtained from: https://developer.apple.com/xcode/downloads/ To check that the Xcode has been updated: * Select Xcode in the menu bar * Select About Xcode * The version after applying this update will be "7.0". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCAAGBQJV+axlAAoJEBcWfLTuOo7tzuMQAJhCQaeClT0rDozh+WlKgM6f X86xFeXLJ1gjlPKH183Bvm2gTW0m5kQuoNK1grarMB+rEeb8mPsOczwrIJisxVlr 5zkW/7JktHcsBU5vUa4j4T/CEJjp92VPZ4ub3k3eQOrhinn4E86uKcMxrYoQOAE0 YFMSDaPBFy+LIJ08ROB/AH8fkGJMLRCRAp43IGgzNuxCDx9jzW97m1dh86mR1CxP GdhWRvN7T5YqXyJTw6pZbEHtVXjty8appe2ScvHByCRxa4gZq+/JinHInLjaB4p7 3o58rAWh7lDhcEi3HqkIu0YW6fLslPydCHTI4cH1PCHTuevNjjvK34IqMbD0jG/t tO+vQFhwXpD5chsSB2oP2zLOWAJ7BA5uwvArkJhGKKzQ5DEI0soLBWG7Koe3RitO HokIMyx0r+sf4YD+OP4RVPU9bU4FpayXZnECmHzWmK2vguihbIzjxq+Knvx7aiF9 js1Qn0DxT2puVYdhixtkvYKT7r8XRjI8MPLEwS+tX1Yg1Lqhz2G1MR6mO9iBW56L g5deOuCVc56qeaobuUK0clvdFYtyd5jIXgh0zspZ4ssCbbdCOTZUQaG1mBGkIf3R JgWTX8ny1Fdk9om3dmZVWUCzzqxJR/tm5M7kjGc425ZGaoBRWLga1VIjNz7MEfKS YMBNmqt6weEewNqyDMnX =SGgX -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2014-6394 // JVNDB: JVNDB-2014-004624 // BID: 70100 // VULHUB: VHN-74338 // PACKETSTORM: 133617

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:20

Trust: 1.6

vendor:fedoraprojectmodel:fedorascope:eqversion:21

Trust: 1.6

vendor:fedoraprojectmodel:fedorascope:eqversion:19

Trust: 1.6

vendor:applemodel:xcodescope:eqversion:7.0

Trust: 1.0

vendor:joyentmodel:node.jsscope:lteversion:0.8.3

Trust: 1.0

vendor:joyentmodel:node.jsscope:eqversion:0.8.1

Trust: 1.0

vendor:joyentmodel:node.jsscope:eqversion:0.8.2

Trust: 1.0

vendor:joyentmodel:node.jsscope:eqversion:0.8.0

Trust: 1.0

vendor:node jsmodel:node.jsscope:ltversion:0.8.4

Trust: 0.8

vendor:applemodel:xcodescope:ltversion:7.0 (os x yosemite v10.10.4 or later )

Trust: 0.8

vendor:applemodel:xcodescope:eqversion:2.4.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.0

Trust: 0.3

sources: BID: 70100 // JVNDB: JVNDB-2014-004624 // CNNVD: CNNVD-201410-165 // NVD: CVE-2014-6394

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-6394
value: HIGH

Trust: 1.0

NVD: CVE-2014-6394
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201410-165
value: HIGH

Trust: 0.6

VULHUB: VHN-74338
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-6394
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-74338
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-74338 // JVNDB: JVNDB-2014-004624 // CNNVD: CNNVD-201410-165 // NVD: CVE-2014-6394

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-74338 // JVNDB: JVNDB-2014-004624 // NVD: CVE-2014-6394

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201410-165

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201410-165

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004624

PATCH

title:APPLE-SA-2015-09-16-2 Xcode 7.0url:http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html

Trust: 0.8

title:HT205217url:https://support.apple.com/en-us/HT205217

Trust: 0.8

title:HT205217url:http://support.apple.com/ja-jp/HT205217

Trust: 0.8

title:FEDORA-2014-11495url:https://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.html

Trust: 0.8

title:FEDORA-2014-11421url:https://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html

Trust: 0.8

title:FEDORA-2014-11289url:https://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.html

Trust: 0.8

title:Fix a path traversal issue when using rooturl:https://github.com/pillarjs/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a

Trust: 0.8

title:Insecure comparison #59url:https://github.com/pillarjs/send/pull/59

Trust: 0.8

title:Top Pageurl:https://nodejs.org/en/

Trust: 0.8

title:Bug 1146063url:https://bugzilla.redhat.com/show_bug.cgi?id=1146063

Trust: 0.8

title:send-0.8.4url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51809

Trust: 0.6

title:send-0.8.4url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51808

Trust: 0.6

sources: JVNDB: JVNDB-2014-004624 // CNNVD: CNNVD-201410-165

EXTERNAL IDS

db:NVDid:CVE-2014-6394

Trust: 2.9

db:BIDid:70100

Trust: 1.4

db:OPENWALLid:OSS-SECURITY/2014/09/30/10

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2014/09/24/1

Trust: 1.1

db:SECUNIAid:62170

Trust: 1.1

db:JVNid:JVNVU99970459

Trust: 0.8

db:JVNDBid:JVNDB-2014-004624

Trust: 0.8

db:CNNVDid:CNNVD-201410-165

Trust: 0.7

db:AUSCERTid:ESB-2020.4254

Trust: 0.6

db:VULHUBid:VHN-74338

Trust: 0.1

db:PACKETSTORMid:133617

Trust: 0.1

sources: VULHUB: VHN-74338 // BID: 70100 // JVNDB: JVNDB-2014-004624 // PACKETSTORM: 133617 // CNNVD: CNNVD-201410-165 // NVD: CVE-2014-6394

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/sep/msg00002.html

Trust: 1.1

url:http://www.securityfocus.com/bid/70100

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21687263

Trust: 1.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1146063

Trust: 1.1

url:https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a

Trust: 1.1

url:https://support.apple.com/ht205217

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-september/139415.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-october/140020.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-october/139938.html

Trust: 1.1

url:https://github.com/visionmedia/send/pull/59

Trust: 1.1

url:https://nodesecurity.io/advisories/send-directory-traversal

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2014/09/24/1

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2014/09/30/10

Trust: 1.1

url:http://secunia.com/advisories/62170

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/96727

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6394

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99970459/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6394

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.4254/

Trust: 0.6

url:http://nodejs.org

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-0248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3185

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3568

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3513

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://developer.apple.com/xcode/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6394

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0251

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5909

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.1

sources: VULHUB: VHN-74338 // BID: 70100 // JVNDB: JVNDB-2014-004624 // PACKETSTORM: 133617 // CNNVD: CNNVD-201410-165 // NVD: CVE-2014-6394

CREDITS

Ilya Kantor

Trust: 0.3

sources: BID: 70100

SOURCES

db:VULHUBid:VHN-74338
db:BIDid:70100
db:JVNDBid:JVNDB-2014-004624
db:PACKETSTORMid:133617
db:CNNVDid:CNNVD-201410-165
db:NVDid:CVE-2014-6394

LAST UPDATE DATE

2024-08-14T12:53:10.168000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-74338date:2017-09-08T00:00:00
db:BIDid:70100date:2015-11-03T19:43:00
db:JVNDBid:JVNDB-2014-004624date:2015-10-05T00:00:00
db:CNNVDid:CNNVD-201410-165date:2020-12-02T00:00:00
db:NVDid:CVE-2014-6394date:2017-09-08T01:29:14.403

SOURCES RELEASE DATE

db:VULHUBid:VHN-74338date:2014-10-08T00:00:00
db:BIDid:70100date:2014-09-12T00:00:00
db:JVNDBid:JVNDB-2014-004624date:2014-10-10T00:00:00
db:PACKETSTORMid:133617date:2015-09-19T15:31:48
db:CNNVDid:CNNVD-201410-165date:2014-10-13T00:00:00
db:NVDid:CVE-2014-6394date:2014-10-08T17:55:05.123