~ 6 min read
NodeJS Path Traversal Vulnerability Scanner
In this Node.js Security blog I write a lot about secure coding practices for Node.js applications but today I want to show you a more offensive side of security - a NodeJS path traversal vulnerability scanner.
What is a path traversal vulnerability?
Path traversal vulnerabilities are a type of security vulnerability that allows an attacker to read files on the (Node.js backend) server that they should not be able to read. I mentioned Node.js backend in parenthesis because that is mostly the target but this is also true for any compute and server-side technology such as serving requests from AWS Lambdas, Vercel functions or server-side rendered Nuxt and Next.js API routes.
The existing of a path traversal vulnerability can be used to read sensitive files such as configuration files, source code, and more. Think about what could happen if an attacker could read your .env
file or your package.json
file - they gain a lot of information about your running Node.js application and can use that information to further attack your application, pivot to other systems or escalate their privileges.
In 2022, I spoke at NodeConf EU, the premier Node.js conference in Europe, about the topic of Path Traversal vulnerabilities in Node.js applications. The talk was titled “Char Wars: The Path Traversal Strikes Back” and you can watch the recording of the talk on YouTube:
In this talk, I demonstrated how path traversal vulnerabilities can be exploited in Node.js applications and how to prevent them. I also demonstrated how the Node.js runtime was vulnerable to this type of attack and how it was fixed. You’re invited to watch the talk recording or read up on this quick write-up that re-caps the steps to reconstruct a path traversal scanner that offensive hackers would use.
A Path Traversal Scanner
So as I said in the intro, in this blog post, I will show you how to use a tool that actively make dynamic HTTP requests to find Path Traversal vulnerabilities in your Node.js applications.
Meet dotdotpwn, a command-line tool (written in Perl! Exotic 😆) that makes use of a dictionary of directory patterns that traverse out of a given path. By sending crafted requests with these path traversal patterns to a running server, the tool enumerates thousands of file paths in aim to find a true positive instance that proves the running server is vulnerable to a path traversal attack.
Executing a Path Traversal Scan
You can clone the dotdotpwn
source repository and run it from source, or better yet, you can use a pre-built Docker image that contains all the dependencies and the tool itself, making it easier to run the tool without having to install Perl and its dependencies.
To follow along this write-up, you can refer to my GitHub repository of a Docker container image for dotdotpwn: https://github.com/lirantal/dotdotpwn-docker.git
👋 Just a quick break
I'm Liran Tal and I'm the author of the newest series of expert Node.js Secure Coding books. Check it out and level up your JavaScript
Based on the above, we can invoke the --help
command to see the available options and arguments that the tool dotdotpwn
tool accepts:
If everything is successful, you should see an output similar to the following:
We can now continue to launch a dynamic application security scan against a target server that we suspect is vulnerable to a path traversal attack. The tool accepts a variety of arguments to configure the scan, such as the target URL, the dictionary file to use, the number of threads to use, and more.
You’ll specifically notice how we use command-line arguments to filter the noise and focus on true positive results only. The -k
argument is used to match a specific string in the response, and the -f
argument is used to specify a specific file to look for.
Running the above command will produce output results such as:
The scan continues with HTTP requests to the target server, and if a match is found, it will be printed to the console output and show you the path traversal pattern that was successful.