CVE-2021-35397

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-35397
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-35397.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-35397
Published
2021-08-04T11:15:08Z
Modified
2025-01-14T09:19:19.613164Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending crafted HTTP request with specific path to read. Successful exploitation could allow the attacker to read files that should be restricted.

References

Affected packages

Git / github.com/drogonframework/drogon

Affected versions

v1.*

v1.1.0
v1.2.0
v1.3.0
v1.4.0
v1.4.1
v1.5.0
v1.5.1
v1.6.0