blob: ae759038158575da39c2241e06dc7ae224377170 [file] [log] [blame]
modules:
- module: github.com/goadesign/goa
versions:
- fixed: 1.4.3
vulnerable_at: 1.4.3-0.20191129212618-4f2e80285f2e
packages:
- package: github.com/goadesign/goa
symbols:
- Controller.FileHandler
derived_symbols:
- Service.ListenAndServe
- Service.ListenAndServeTLS
- Service.Serve
- mux.ServeHTTP
- module: goa.design/goa
versions:
- fixed: 1.4.3
vulnerable_at: 1.4.3-0.20191129212618-4f2e80285f2e
packages:
- package: goa.design/goa
symbols:
- Controller.FileHandler
skip_fix: 'TODO: revisit this reason (cannot find module providing package
github.com/goadesign/goa/uuid)'
- module: goa.design/goa/v3
versions:
- fixed: 3.0.9
vulnerable_at: 3.0.8
packages:
- package: goa.design/goa/v3
symbols:
- Controller.FileHandler
skip_fix: 'TODO: revisit this reason (goa.design/goa/v3 appears to not be
a package, but I could not locate the fix for this issue in v3)'
description: |
Due to improper santization of user input, Controller.FileHandler allows
for directory traversal, allowing an attacker to read files outside of
the target directory that the server has permission to read.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-fjgq-224f-fq37
credit: '@christi3k'
references:
- fix: https://github.com/goadesign/goa/pull/2388
- fix: https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39
cve_metadata:
id: CVE-2019-25073
cwe: 'CWE-22: Improper Limitation of a Pathname to a Restricted Directory(''Path
Traversal'')'
description: |
Improper path santiziation in github.com/goadesign/goa before v3.0.9, v2.0.10, or
v1.4.3 allow remote attackers to read files outside of the intended directory.