| "dataType": "CVE_RECORD", |
| "cveId": "CVE-2020-36559" |
| "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc" |
| "value": "Due to improper santization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read." |
| "vendor": "aahframe.work", |
| "product": "aahframe.work", |
| "collectionURL": "https://pkg.go.dev", |
| "packageName": "aahframe.work", |
| "name": "HTTPEngine.Handle" |
| "name": "Application.Run" |
| "name": "Application.ServeHTTP" |
| "name": "Application.Start" |
| "defaultStatus": "unaffected" |
| "description": "CWE 23: Relative Path Traversal" |
| "url": "https://github.com/go-aah/aah/pull/267" |
| "url": "https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec" |
| "url": "https://github.com/go-aah/aah/issues/266" |
| "url": "https://pkg.go.dev/vuln/GO-2020-0033" |