Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03cDdjLXB2dngtMnZ4M84AAwJ3

hyper-staticfile's improper validation of Windows paths could lead to directory traversal attack

Path resolution in hyper-staticfile didn't correctly validate Windows paths, meaning paths like /foo/bar/c:/windows/web/screen/img101.png would be allowed and respond with the contents of c:/windows/web/screen/img101.png. Thus users could potentially read files anywhere on the filesystem.

This only impacts Windows. Linux and other unix likes are not impacted by this.

Permalink: https://github.com/advisories/GHSA-7p7c-pvvx-2vx3
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03cDdjLXB2dngtMnZ4M84AAwJ3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: over 1 year ago


Identifiers: GHSA-7p7c-pvvx-2vx3
References: Repository: https://github.com/stephank/hyper-staticfile
Blast Radius: 0.0

Affected Packages

cargo:hyper-staticfile
Dependent packages: 24
Dependent repositories: 48
Downloads: 471,085 total
Affected Version Ranges: = 0.10.0-alpha.1, < 0.9.2
Fixed in: 0.10.0-alpha.2, 0.9.2
All affected versions: 0.1.0, 0.1.1, 0.2.0, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.6.0, 0.7.0, 0.8.0, 0.9.0, 0.9.1, 0.10.0-alpha.1
All unaffected versions: 0.9.2, 0.9.3, 0.9.4, 0.9.5, 0.9.6, 0.10.0, 0.10.1