Lucene search

K
githubGitHub Advisory DatabaseGHSA-V3RG-QM46-XRG9
HistoryJan 13, 2024 - 6:30 a.m.

Path traversal in flaskcode

2024-01-1306:30:26
CWE-22
GitHub Advisory Database
github.com
6
path traversal
flaskcode
directory traversal
python
post request
views.py
arbitrary files

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

18.0%

An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files.

Affected configurations

Vulners
Node
flaskcodeRange0.0.8
VendorProductVersionCPE
*flaskcode*cpe:2.3:a:*:flaskcode:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

18.0%

Related for GHSA-V3RG-QM46-XRG9