First published: Tue Sep 10 2024(Updated: )
serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0.
Affected Software | Affected Version | How to fix |
---|---|---|
serve-static | <1.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-2311154 is considered to have a significant impact due to the potential for untrusted code execution.
To remediate vulnerability REDHAT-BUG-2311154, upgrade to serve-static version 1.16.0 or higher.
Versions of serve-static prior to 1.16.0 are vulnerable to REDHAT-BUG-2311154.
REDHAT-BUG-2311154 can lead to arbitrary code execution through improper handling of user input.
Yes, a patch for REDHAT-BUG-2311154 is included in serve-static version 1.16.0.