A path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending crafted HTTP request with specific path to read. Successful exploitation could allow the attacker to read files that should be restricted.
References
Link | Resource |
---|---|
https://github.com/an-tao/drogon | Third Party Advisory |
https://github.com/an-tao/drogon/blob/834e3eabdd0441ad2bc80c02e8bbfc3b8312c213/lib/src/StaticFileRouter.cc#L62-L67 | Exploit Third Party Advisory |
https://github.com/an-tao/drogon/wiki/ENG-02-Installation | Third Party Advisory |
https://github.com/an-tao/drogon/wiki/ENG-03-Quick-Start#Static-Site | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-08-04T10:41:07
Updated: 2021-08-04T10:41:07
Reserved: 2021-06-23T00:00:00
Link: CVE-2021-35397
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-08-04T11:15:08.003
Modified: 2021-08-11T23:33:00.853
Link: CVE-2021-35397
JSON object: View
Redhat Information
No data.
CWE