blob: 823b8ea31dc34c327666c8199652dc0e86e5c4f5 [file] [log] [blame]
modules:
- module: github.com/goadesign/goa
versions:
- fixed: 1.4.3
packages:
- package: github.com/goadesign/goa
symbols:
- Controller.FileHandler
- module: goa.design/goa
versions:
- fixed: 1.4.3
packages:
- package: goa.design/goa
symbols:
- Controller.FileHandler
- module: goa.design/goa/v3
versions:
- fixed: 3.0.9
packages:
- package: goa.design/goa/v3
symbols:
- Controller.FileHandler
description: |
Due to improper santization of user input, Controller.FileHandler allows
for directory traversal, allowing an attacker to read files outside of
the target directory that the server has permission to read.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-fjgq-224f-fq37
credit: '@christi3k'
references:
- fix: https://github.com/goadesign/goa/pull/2388
- fix: https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39
cve_metadata:
id: CVE-2019-25073
cwe: 'CWE-22: Improper Limitation of a Pathname to a Restricted Directory(''Path
Traversal'')'
description: |
Improper path santiziation in github.com/goadesign/goa before v3.0.9, v2.0.10, or
v1.4.3 allow remote attackers to read files outside of the intended directory.