Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03cDdjLXB2dngtMnZ4M84AAwJ3
hyper-staticfile's improper validation of Windows paths could lead to directory traversal attack
Path resolution in hyper-staticfile
didn't correctly validate Windows paths, meaning paths like /foo/bar/c:/windows/web/screen/img101.png
would be allowed and respond with the contents of c:/windows/web/screen/img101.png
. Thus users could potentially read files anywhere on the filesystem.
This only impacts Windows. Linux and other unix likes are not impacted by this.
Permalink: https://github.com/advisories/GHSA-7p7c-pvvx-2vx3JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03cDdjLXB2dngtMnZ4M84AAwJ3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: over 1 year ago
Identifiers: GHSA-7p7c-pvvx-2vx3
References:
- https://github.com/stephank/hyper-staticfile/issues/35
- https://rustsec.org/advisories/RUSTSEC-2022-0069.html
- https://github.com/stephank/hyper-staticfile/pull/36
- https://github.com/stephank/hyper-staticfile/commit/1e40e31d64bc6b32e595d24074092dcf84410b2b
- https://github.com/advisories/GHSA-7p7c-pvvx-2vx3
Blast Radius: 0.0
Affected Packages
cargo:hyper-staticfile
Dependent packages: 24Dependent repositories: 48
Downloads: 471,085 total
Affected Version Ranges: = 0.10.0-alpha.1, < 0.9.2
Fixed in: 0.10.0-alpha.2, 0.9.2
All affected versions: 0.1.0, 0.1.1, 0.2.0, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.6.0, 0.7.0, 0.8.0, 0.9.0, 0.9.1, 0.10.0-alpha.1
All unaffected versions: 0.9.2, 0.9.3, 0.9.4, 0.9.5, 0.9.6, 0.10.0, 0.10.1