Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j453-hm5x-c46w

Опубликовано: 07 дек. 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Echo vulnerable to directory traversal

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.

Пакеты

Наименование

github.com/labstack/echo/v4

go
Затронутые версииВерсия исправления

< 4.2.0

4.2.0

EPSS

Процентиль: 60%
0.00399
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 3 лет назад

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.

CVSS3: 5.3
nvd
около 3 лет назад

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.

CVSS3: 5.3
debian
около 3 лет назад

Due to improper sanitization of user input on Windows, the static file ...

EPSS

Процентиль: 60%
0.00399
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-22