Lucene search

K
githubGitHub Advisory DatabaseGHSA-VP56-R7QV-783V
HistoryDec 28, 2022 - 12:30 a.m.

ahh vulnerable to Path Traversal

2022-12-2800:30:23
CWE-22
GitHub Advisory Database
github.com
10
path traversal
user input
sanitization
httpengine
directory traversal
file read
server permission

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

50.1%

Due to improper santization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.

Affected configurations

Vulners
Node
aahframe.workRange<0.12.4
OR
go-aahaahRange<0.12.4
VendorProductVersionCPE
*aahframe.work*cpe:2.3:a:*:aahframe.work:*:*:*:*:*:*:*:*
go-aahaah*cpe:2.3:a:go-aah:aah:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

50.1%

Related for GHSA-VP56-R7QV-783V