CVE-2020-15097

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15097
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15097.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-15097
Related
  • GHSA-7557-4v29-rqw6
Published
2021-02-02T18:15:11Z
Modified
2025-01-15T01:42:52.745673Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

loklak is an open-source server application which is able to collect messages from various sources, including twitter. The server contains a search index and a peer-to-peer index sharing interface. All messages are stored in an elasticsearch index. In loklak less than or equal to commit 5f48476, a path traversal vulnerability exists. Insufficient input validation in the APIs exposed by the loklak server allowed a directory traversal vulnerability. Any admin configuration and files readable by the app available on the hosted file system can be retrieved by the attacker. Furthermore, user-controlled content could be written to any admin config and files readable by the application. This has been patched in commit 50dd692. Users will need to upgrade their hosted instances of loklak to not be vulnerable to this exploit.

References

Affected packages

Git / github.com/loklak/loklak_server

Affected ranges

Type
GIT
Repo
https://github.com/loklak/loklak_server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v1.*

v1.0
v1.0-pre