-
Notifications
You must be signed in to change notification settings - Fork 535
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security] Path Traversal In Windows #1714
Comments
pmlopes
added a commit
that referenced
this issue
Sep 29, 2020
Signed-off-by: Paulo Lopes <pmlopes@gmail.com> (cherry picked from commit d519a09) Signed-off-by: Paulo Lopes <pmlopes@gmail.com>
Any chance that this will be backported to a 3.9.x patch release since this has a pretty high CVSS score per Sonatype? |
Hi, when I search CVE for this issue, i found CVE-2018-12542. |
yes it will be backported and released in 3.9.4
…On Wed, Oct 7, 2020 at 3:49 PM tmousaw-ptc ***@***.***> wrote:
Any chance that this will be backported to a 3.9.x patch release since
this has a pretty high CVSS score per Sonatype?
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#1714 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AABXDCVJHZISTV2T4L3VUPLSJRWWFANCNFSM4R2VLVAQ>
.
|
vietj
pushed a commit
that referenced
this issue
Oct 15, 2020
Signed-off-by: Paulo Lopes <pmlopes@gmail.com> (cherry picked from commit d519a09) Signed-off-by: Paulo Lopes <pmlopes@gmail.com>
This has been recorded as CVE-2019-17640 |
1 task
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi, I think there is a potential vul in io.vertx.ext.web.handler.StaticHandler.
Example code:
https://github.com/vert-x3/vertx-examples/blob/3.x/web-examples/src/main/java/io/vertx/example/web/staticsite/Server.java
Use PoC below will lead to Path Traversal in Windows
PoC:
http://ip:8080/%5c..%5cServer.java
%5c..%5c is a legitimate path for the URI spec. But in Handler, directly use it to find some resources is not security.
In io.vertx.ext.web.handler.impl.StaticHandlerImpl#handle, io.vertx.core.http.impl.HttpUtils#removeDots just sanitize
/../
without considering\..\
. So it will lead a Path Traversal in Windows.The text was updated successfully, but these errors were encountered: