Vulnerability Description
Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aahframework | Aah | < 0.12.4 |
Related Weaknesses (CWE)
References
- https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ecPatchThird Party Advisory
- https://github.com/go-aah/aah/issues/266Issue TrackingThird Party Advisory
- https://github.com/go-aah/aah/pull/267Third Party Advisory
- https://pkg.go.dev/vuln/GO-2020-0033Third Party Advisory
- https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ecPatchThird Party Advisory
- https://github.com/go-aah/aah/issues/266Issue TrackingThird Party Advisory
- https://github.com/go-aah/aah/pull/267Third Party Advisory
- https://pkg.go.dev/vuln/GO-2020-0033Third Party Advisory
FAQ
What is CVE-2020-36559?
CVE-2020-36559 is a vulnerability with a CVSS score of 7.5 (HIGH). Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
How severe is CVE-2020-36559?
CVE-2020-36559 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-36559?
Check the references section above for vendor advisories and patch information. Affected products include: Aahframework Aah.