CVE-2021-35397

Source
https://cve.org/CVERecord?id=CVE-2021-35397
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-35397.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-35397
Published
2021-08-04T11:15:08.003Z
Modified
2026-02-13T02:23:34.986408Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending crafted HTTP request with specific path to read. Successful exploitation could allow the attacker to read files that should be restricted.

References

Affected packages

Git / github.com/drogonframework/drogon

Affected ranges

Type
GIT
Repo
https://github.com/drogonframework/drogon
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
Last affected

Affected versions

v1.*
v1.1.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-35397.json"