GHSA-9355-27m8-h74v

Suggest an improvement
Source
https://github.com/advisories/GHSA-9355-27m8-h74v
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-9355-27m8-h74v/GHSA-9355-27m8-h74v.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9355-27m8-h74v
Aliases
Published
2024-08-05T21:29:26Z
Modified
2024-11-18T16:27:00Z
Severity
  • 2.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
  • 5.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Owncast Path Traversal vulnerability
Details

Owncast is an open source, self-hosted, decentralized, single user live video streaming and chat server. The Owncast application exposes an administrator API at the URL /api/admin. The emoji/delete endpoint of said API allows administrators to delete custom emojis, which are saved on disk. The parameter name is taken from the JSON request and directly appended to the filepath that points to the emoji to delete. By using path traversal sequences (../), attackers with administrative privileges can exploit this endpoint to delete arbitrary files on the system, outside of the emoji directory. This vulnerability is fixed in 0.1.3.

Database specific
{
    "severity": "MODERATE",
    "github_reviewed_at": "2024-08-05T21:29:26Z",
    "nvd_published_at": "2024-04-19T19:15:06Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "github_reviewed": true
}
References

Affected packages

Go / github.com/owncast/owncast

Package

Name
github.com/owncast/owncast
View open source insights on deps.dev
Purl
pkg:golang/github.com/owncast/owncast

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.3