Looking for the vulnerability index of Invicti's legacy products?
Grandnode Path Traversal (CVE-2019-12276) - Vulnerability Database

Grandnode Path Traversal (CVE-2019-12276)

Description

GrandNode versions prior to the patch contain a path traversal vulnerability (CVE-2019-12276) in the LetsEncryptController component. This flaw allows unauthenticated remote attackers to bypass directory restrictions and read arbitrary files from the web server's file system by manipulating file path parameters. The vulnerability exists due to insufficient input validation and sanitization of user-supplied path data.

Remediation

Immediately upgrade GrandNode to a patched version that addresses CVE-2019-12276. If immediate patching is not possible, implement the following interim mitigations:

1. Review and restrict access to the LetsEncryptController endpoint at the web server or firewall level
2. Implement input validation to reject path traversal sequences (../, ..\ and encoded variants)
3. Use allowlists to restrict file access to specific directories
4. Apply the principle of least privilege to the web application's file system permissions
5. Monitor web server logs for suspicious file access patterns or path traversal attempts

After upgrading, verify the fix by testing that path traversal attempts are properly blocked and return appropriate error responses.

Related Vulnerabilities