We found results for “”
WS-2022-0409
Good to know:
Date: November 3, 2024
In hyper-staticfile in Rust prior to 0.9.2, an improper validation of Windows paths could lead to directory traversal attack. The path resolution didn't correctly validate Windows paths meaning paths like /foo/bar/c:/windows/web/screen/img101.png would be allowed and respond with the contents of c:/windows/web/screen/img101.png. Thus users could potentially read files anywhere on the filesystem. This only impacts Windows. Linux and other unix likes are not impacted by this.
Language: RUST
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Relative Path Traversal
CWE-23Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |