blob: 85bc25bd9eac2b47fdf35b72b86a59bc421b10ba [file] [log] [blame]
modules:
- module: github.com/kataras/iris/v12
versions:
- fixed: 12.2.0-alpha8
vulnerable_at: 12.1.8
packages:
- package: github.com/kataras/iris/v12/context
symbols:
- Context.UploadFormFiles
- module: github.com/kataras/iris
vulnerable_at: 0.0.2
packages:
- package: github.com/kataras/iris/context
symbols:
- Context.UploadFormFiles
description: |
The Context.UploadFormFiles function is vulnerable to directory
traversal attacks, and can be made to write to arbitrary locations
outside the destination directory.
This vulnerability only occurs when built with Go versions prior to 1.17.
Go 1.17 and later strip directory paths from filenames returned by
"mime/multipart".Part.FileName, which avoids this issue.
published: 2022-07-15T23:08:12Z
cves:
- CVE-2021-23772
ghsas:
- GHSA-jcxc-rh6w-wf49
credit: Snyk Security Team
references:
- fix: https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08
- web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169
- web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170