Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04Y3c5LTVobXYtNzd3Ns4AAt2Z

sanic vulnerable to Path Traversal when using `app.static` if using encoded `%2F` URLs

Impact

Access to lateral directories when using app.static if using encoded %2F URLs. Parent directory traversal is not impacted.

Patches

References

https://github.com/sanic-org/sanic/issues/2478
https://github.com/sanic-org/sanic/pull/2495

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-8cw9-5hmv-77w6
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04Y3c5LTVobXYtNzd3Ns4AAt2Z
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago


CVSS Score: 8.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

Identifiers: GHSA-8cw9-5hmv-77w6, CVE-2022-35920
References: Repository: https://github.com/sanic-org/sanic
Blast Radius: 29.1

Affected Packages

pypi:sanic
Dependent packages: 123
Dependent repositories: 3,204
Downloads: 741,581 last month
Affected Version Ranges: < 20.12.7, >= 21.0.0, < 21.12.2, >= 22.0.0, < 22.6.1
Fixed in: 20.12.7, 21.12.2, 22.6.1
All affected versions: 0.1.0, 0.1.1, 0.1.3, 0.1.4, 0.1.5, 0.1.6, 0.1.7, 0.1.8, 0.1.9, 0.2.0, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.5.0, 0.5.1, 0.5.2, 0.5.4, 0.6.0, 0.7.0, 0.8.0, 0.8.1, 0.8.2, 0.8.3, 18.12.0, 19.3.1, 19.6.0, 19.6.2, 19.6.3, 19.9.0, 19.12.0, 19.12.2, 19.12.3, 19.12.4, 19.12.5, 20.3.0, 20.6.0, 20.6.1, 20.6.2, 20.6.3, 20.9.0, 20.9.1, 20.12.0, 20.12.1, 20.12.2, 20.12.3, 20.12.4, 20.12.5, 20.12.6, 21.3.0, 21.3.1, 21.3.2, 21.3.4, 21.6.0, 21.6.1, 21.6.2, 21.9.0, 21.9.1, 21.9.2, 21.9.3, 21.12.0, 21.12.1, 22.3.0, 22.3.1, 22.3.2, 22.6.0
All unaffected versions: 20.12.7, 21.12.2, 22.6.1, 22.6.2, 22.9.0, 22.9.1, 22.12.0, 23.3.0, 23.6.0, 23.12.0, 23.12.1