Vulnerability Description
The ganga-devs/ganga repository before 8.5.10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ganga Project | Ganga | < 8.5.10 |
Related Weaknesses (CWE)
References
- https://github.com/ganga-devs/ganga/commit/730e7aba192407d35eb37dd7938d49071124bExploitPatchThird Party Advisory
- https://github.com/ganga-devs/ganga/releases/tag/8.5.10Release NotesThird Party Advisory
- https://github.com/github/securitylab/issues/669#issuecomment-1117265726ExploitIssue TrackingThird Party Advisory
- https://github.com/ganga-devs/ganga/commit/730e7aba192407d35eb37dd7938d49071124bExploitPatchThird Party Advisory
- https://github.com/ganga-devs/ganga/releases/tag/8.5.10Release NotesThird Party Advisory
- https://github.com/github/securitylab/issues/669#issuecomment-1117265726ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2022-31507?
CVE-2022-31507 is a vulnerability with a CVSS score of 9.3 (CRITICAL). The ganga-devs/ganga repository before 8.5.10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
How severe is CVE-2022-31507?
CVE-2022-31507 has been rated CRITICAL with a CVSS base score of 9.3/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-31507?
Check the references section above for vendor advisories and patch information. Affected products include: Ganga Project Ganga.