CVE-2025-64184

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-64184
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64184.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64184
Aliases
Downstream
Published
2025-11-07T03:02:41.838Z
Modified
2025-12-05T10:21:28.472226Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Dosage vulnerable to Directory Traversal through crafted HTTP responses
Details

Dosage is a comic strip downloader and archiver. When downloading comic images in versions 3.1 and below, Dosage constructs target file names from different aspects of the remote comic (page URL, image URL, page content, etc.). While the basename is properly stripped of directory-traversing characters, the file extension is taken from the HTTP Content-Type header. This allows a remote attacker (or a Man-in-the-Middle, if the comic is served over HTTP) to write arbitrary files outside the target directory (if additional conditions are met). This issue is fixed in version 3.2.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64184.json",
    "cwe_ids": [
        "CWE-22"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/webcomics/dosage

Affected ranges

Type
GIT
Repo
https://github.com/webcomics/dosage
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.10
1.11
1.12
1.13
1.14
1.15
1.7
1.8
1.9

2.*

2.0
2.1
2.10
2.11
2.12
2.13
2.14
2.15
2.16
2.17
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9

3.*

3.0
3.1