Описание
Directory traversal in mkdocs
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2021-40978
- https://github.com/mkdocs/mkdocs/issues/2601
- https://github.com/nisdn/CVE-2021-40978/issues/1
- https://github.com/mkdocs/mkdocs/pull/2604
- https://github.com/mkdocs/mkdocs/commit/1b15412f4caae476c262210315fd068d0521a833
- https://github.com/mkdocs/mkdocs/commit/57540911a0d632674dd23edec765189f96f84f6b
- https://github.com/mkdocs/mkdocs/releases/tag/1.2.3
- https://github.com/nisdn/CVE-2021-40978
- https://github.com/pypa/advisory-database/tree/main/vulns/mkdocs/PYSEC-2021-878.yaml
Пакеты
mkdocs
= 1.2.2
1.2.3
Связанные уязвимости
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1
The mkdocs 1.2.2 built-in dev-server allows directory traversal using ...