Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-25w9-wqfq-gwqx

Опубликовано: 11 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

SiYuan has an arbitrary file read and path traversal via /api/export/exportResources

Summary

Siyuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure.

Impact

Arbitrary File Read

Пакеты

Наименование

github.com/siyuan-note/siyuan/kernel

go
Затронутые версииВерсия исправления

<= 0.0.0-20241210012039-5129ad926a21

Отсутствует

EPSS

Процентиль: 53%
0.00306
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.5
nvd
11 месяцев назад

SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. Version 3.1.16 contains a patch for the issue.

EPSS

Процентиль: 53%
0.00306
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-22