Описание
Upsonic is vulnerable to Path Traversal attack through its os.path.join function
A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerability affects the function os.path.join of the file markdown/server.py. The manipulation of the argument file.filename leads to path traversal. The exploit has been disclosed to the public and may be used.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-6278
- https://github.com/Upsonic/Upsonic/issues/356
- https://github.com/Upsonic/Upsonic/pull/360
- https://github.com/Upsonic/Upsonic/commit/a54529acc6e4bfe28f4f5c80c058144348a306b7
- https://github.com/Upsonic/Upsonic/blob/v0.55.6/src/upsonic/server/markdown/server/server.py#L39
- https://github.com/pypa/advisory-database/tree/main/vulns/upsonic/PYSEC-2025-67.yaml
- https://vuldb.com/?ctiid.313282
- https://vuldb.com/?id.313282
- https://vuldb.com/?submit.593096
Пакеты
Наименование
upsonic
pip
Затронутые версииВерсия исправления
< 0.56.0
0.56.0
Связанные уязвимости
CVSS3: 5.5
nvd
8 месяцев назад
A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerability affects the function os.path.join of the file markdown/server.py. The manipulation of the argument file.filename leads to path traversal. The exploit has been disclosed to the public and may be used.