Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13d2gyLXIzODctZzVybc4AArs8
tower-http's improper validation of Windows paths could lead to directory traversal attack
tower_http::services::fs::ServeDir
didn't correctly validate Windows paths meaning paths like /foo/bar/c:/windows/web/screen/img101.png
would be allowed and respond with the contents of c:/windows/web/screen/img101.png
. Thus users could potentially read files anywhere on the filesystem. This only impacts Windows. Linux and other unix likes are not impacted by this.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13d2gyLXIzODctZzVybc4AArs8
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 11 months ago
Identifiers: GHSA-wwh2-r387-g5rm
References:
- https://github.com/tower-rs/tower-http/pull/204
- https://rustsec.org/advisories/RUSTSEC-2021-0135.html
- https://github.com/advisories/GHSA-wwh2-r387-g5rm
Blast Radius: 0.0
Affected Packages
cargo:tower-http
Dependent packages: 291Dependent repositories: 4,231
Downloads: 30,664,692 total
Affected Version Ranges: < 0.1.3, >= 0.2.0, < 0.2.1
Fixed in: 0.1.3, 0.2.1
All affected versions: 0.0.0, 0.1.0, 0.1.1, 0.1.2, 0.2.0
All unaffected versions: 0.1.3, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 0.5.0, 0.5.1, 0.5.2