Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-21620

Опубликовано: 20 фев. 2026
Источник: redhat
CVSS3: 4.2
EPSS Низкий

Описание

Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl. This issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.

A flaw was found in Erlang OTP tftp_file modules. This vulnerability allows an attacker to exploit a weakness in how file paths are handled, known as Relative Path Traversal. By manipulating these paths, an attacker could gain unauthorized access to sensitive files on the system, potentially leading to information disclosure.

Отчет

This vulnerability has a LOW impact. A relative path traversal flaw in the Erlang/OTP TFTP modules could allow an attacker to access or write files outside the intended TFTP directory. This issue affects systems where the Erlang TFTP service is exposed and actively used.

Меры по смягчению последствий

Restrict network access to the TFTP service to trusted hosts using firewall rules. Ensure the TFTP server is configured to operate within a chroot environment to limit file system access. If the TFTP service is not required, disable it. Example for disabling the TFTP service (if managed by systemd): sudo systemctl stop tftp.service sudo systemctl disable tftp.service Restart the TFTP service after applying any configuration changes for them to take effect.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 16.2erlangFix deferred
Red Hat OpenStack Platform 17.1erlangFix deferred
Red Hat OpenStack Platform 18.0erlangFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2441326erlang: Erlang OTP tftp_file modules: Information disclosure via relative path traversal

EPSS

Процентиль: 8%
0.00028
Низкий

4.2 Medium

CVSS3

Связанные уязвимости

ubuntu
около 1 месяца назад

Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl. This issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.

nvd
около 1 месяца назад

Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl. This issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.

msrc
около 1 месяца назад

TFTP Path Traversal

debian
около 1 месяца назад

Relative Path Traversal, Improper Isolation or Compartmentalization vu ...

EPSS

Процентиль: 8%
0.00028
Низкий

4.2 Medium

CVSS3