CVE-2020-15230

Vapor is a web framework for Swift. In Vapor before version 4.29.4, Attackers can access data at arbitrary filesystem paths on the same host as an application. Only applications using FileMiddleware are affected. This is fixed in version 4.29.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vapor_project:vapor:*:*:*:*:*:swift:*:*

History

21 Nov 2024, 05:05

Type Values Removed Values Added
CVSS v2 : 4.0
v3 : 6.5
v2 : 4.0
v3 : 8.5
References () https://github.com/vapor/vapor/commit/cf1651f7ff76515593f4d8ca6e6e15d2247fe255 - Patch, Third Party Advisory () https://github.com/vapor/vapor/commit/cf1651f7ff76515593f4d8ca6e6e15d2247fe255 - Patch, Third Party Advisory
References () https://github.com/vapor/vapor/pull/2500 - Third Party Advisory () https://github.com/vapor/vapor/pull/2500 - Third Party Advisory
References () https://github.com/vapor/vapor/security/advisories/GHSA-vcvg-xgr8-p5gq - Third Party Advisory () https://github.com/vapor/vapor/security/advisories/GHSA-vcvg-xgr8-p5gq - Third Party Advisory

Information

Published : 2020-10-02 19:15

Updated : 2024-11-21 05:05


NVD link : CVE-2020-15230

Mitre link : CVE-2020-15230

CVE.ORG link : CVE-2020-15230


JSON object : View

Products Affected

vapor_project

  • vapor
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')