Lucene search

K
githubGitHub Advisory DatabaseGHSA-6H4Q-63C5-QFQF
HistoryJan 13, 2024 - 6:30 a.m.

Path traversal in flaskcode

2024-01-1306:30:26
CWE-22
GitHub Advisory Database
github.com
6
flaskcode python directorytraversal attackersgetfile.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

38.6%

An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a GET request to a /resource-data/<file_path>.txt URI (from views.py), allows attackers to read arbitrary files.

Affected configurations

Vulners
Node
flaskcodeRange0.0.8
VendorProductVersionCPE
*flaskcode*cpe:2.3:a:*:flaskcode:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

38.6%

Related for GHSA-6H4Q-63C5-QFQF