GHSA-25w9-wqfq-gwqx

Suggest an improvement
Source
https://github.com/advisories/GHSA-25w9-wqfq-gwqx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-25w9-wqfq-gwqx/GHSA-25w9-wqfq-gwqx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-25w9-wqfq-gwqx
Aliases
Published
2024-12-11T18:44:50Z
Modified
2024-12-12T19:19:39Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
SiYuan has an arbitrary file read and path traversal via /api/export/exportResources
Details

Summary

Siyuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure.

Impact

Arbitrary File Read

Database specific
{
    "nvd_published_at": "2024-12-12T02:15:32Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-12-11T18:44:50Z"
}
References

Affected packages

Go / github.com/siyuan-note/siyuan/kernel

Package

Name
github.com/siyuan-note/siyuan/kernel
View open source insights on deps.dev
Purl
pkg:golang/github.com/siyuan-note/siyuan/kernel

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.0.0-20241210012039-5129ad926a21