Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xcnFxLTljNjMteGZyZ84AAt79
tower-http's improper validation of Windows paths could lead to directory traversal attack
tower_http::services::fs::ServeDir
didn't correctly validate Windows paths, meaning paths like /foo/bar/c:/windows/web/screen/img101.png
would be allowed and respond with the contents of c:/windows/web/screen/img101.png
. Thus users could potentially read files anywhere on the filesystem.
This only impacts Windows. Linux and other unix likes are not impacted by this.
See tower-http#204 for more details.
Permalink: https://github.com/advisories/GHSA-qrqq-9c63-xfrgJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xcnFxLTljNjMteGZyZ84AAt79
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: 11 months ago
Identifiers: GHSA-qrqq-9c63-xfrg
References:
- https://github.com/tower-rs/tower-http/pull/204
- https://rustsec.org/advisories/RUSTSEC-2022-0043.html
- https://github.com/advisories/GHSA-qrqq-9c63-xfrg
Blast Radius: 0.0
Affected Packages
cargo:tower-http
Dependent packages: 291Dependent repositories: 4,231
Downloads: 31,805,663 total
Affected Version Ranges: < 0.1.3, = 0.2.0
Fixed in: 0.1.3, 0.2.1
All affected versions: 0.0.0, 0.1.0, 0.1.1, 0.1.2, 0.2.0
All unaffected versions: 0.1.3, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 0.5.0, 0.5.1, 0.5.2