Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4vcx-3pj3-44m7

Опубликовано: 04 нояб. 2025
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

Dosage vulnerable to a Directory Traversal through crafted HTTP responses

Impact

When downloadinging comic images, Dosage constructs target file names from different aspects of the remote comic (page URL, image URL, page content, etc.). While the basename is properly stripped of directory-traversing characters, the file extension is taken from the HTTP Content-Type header. This allows a remote attacker (or a Man-in-the-Middle, if the comic is served over HTTP) to write arbitrary files outside the target directory (if additional conditions are met).

Patches

Fixed in release 3.2. The fix is small and self-contained, so distributors might elect to backport the fix to older versions.

Workarounds

No

Пакеты

Наименование

dosage

pip
Затронутые версииВерсия исправления

< 3.2

3.2

EPSS

Процентиль: 37%
0.00156
Низкий

8.8 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 8.8
ubuntu
3 месяца назад

Dosage is a comic strip downloader and archiver. When downloading comic images in versions 3.1 and below, Dosage constructs target file names from different aspects of the remote comic (page URL, image URL, page content, etc.). While the basename is properly stripped of directory-traversing characters, the file extension is taken from the HTTP Content-Type header. This allows a remote attacker (or a Man-in-the-Middle, if the comic is served over HTTP) to write arbitrary files outside the target directory (if additional conditions are met). This issue is fixed in version 3.2.

CVSS3: 8.8
nvd
3 месяца назад

Dosage is a comic strip downloader and archiver. When downloading comic images in versions 3.1 and below, Dosage constructs target file names from different aspects of the remote comic (page URL, image URL, page content, etc.). While the basename is properly stripped of directory-traversing characters, the file extension is taken from the HTTP Content-Type header. This allows a remote attacker (or a Man-in-the-Middle, if the comic is served over HTTP) to write arbitrary files outside the target directory (if additional conditions are met). This issue is fixed in version 3.2.

EPSS

Процентиль: 37%
0.00156
Низкий

8.8 High

CVSS3

Дефекты

CWE-22