| modules: |
| - module: github.com/goadesign/goa |
| versions: |
| - fixed: 1.4.3 |
| packages: |
| - package: github.com/goadesign/goa |
| symbols: |
| - Controller.FileHandler |
| skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]' |
| - module: goa.design/goa |
| versions: |
| - fixed: 1.4.3 |
| packages: |
| - package: goa.design/goa |
| symbols: |
| - Controller.FileHandler |
| skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]' |
| - module: goa.design/goa/v3 |
| versions: |
| - fixed: 3.0.9 |
| packages: |
| - package: goa.design/goa/v3 |
| symbols: |
| - Controller.FileHandler |
| skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]' |
| description: | |
| Due to improper santization of user input, Controller.FileHandler allows |
| for directory traversal, allowing an attacker to read files outside of |
| the target directory that the server has permission to read. |
| published: 2021-04-14T20:04:52Z |
| ghsas: |
| - GHSA-fjgq-224f-fq37 |
| credit: '@christi3k' |
| references: |
| - fix: https://github.com/goadesign/goa/pull/2388 |
| - fix: https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39 |
| cve_metadata: |
| id: CVE-2019-25073 |
| cwe: 'CWE-22: Improper Limitation of a Pathname to a Restricted Directory(''Path |
| Traversal'')' |
| description: | |
| Improper path santiziation in github.com/goadesign/goa before v3.0.9, v2.0.10, or |
| v1.4.3 allow remote attackers to read files outside of the intended directory. |