GHSA-j453-hm5x-c46w

Suggest an improvement
Source
https://github.com/advisories/GHSA-j453-hm5x-c46w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-j453-hm5x-c46w/GHSA-j453-hm5x-c46w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-j453-hm5x-c46w
Aliases
Published
2022-12-07T18:30:26Z
Modified
2023-11-08T04:03:47.726196Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Echo vulnerable to directory traversal
Details

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.

References

Affected packages

Go / github.com/labstack/echo/v4

Package

Name
github.com/labstack/echo/v4
View open source insights on deps.dev
Purl
pkg:golang/github.com/labstack/echo/v4

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.0