SYM_JSTS_0065 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

External Control of File Name or Path

Property Value
Language javascript
Severity high
CWE CWE-73: External Control of File Name or Path
OWASP A04:2021 - Insecure Design
Confidence Level Medium
Impact Level Medium
Likelihood Level High

Description

Passing user input directly to res.sendFile in Express can let attackers manipulate file paths and access files outside the intended directory. Input should always be validated and paths canonicalized before using sendFile to prevent unauthorized file access.

Impact

If exploited, an attacker could read sensitive files on the server (such as configuration files, environment variables, or source code) by submitting crafted requests. This can lead to data breaches, exposure of credentials, and compromise of the application's security.