CVE-2020-27304

The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal
Configurations

Configuration 1 (hide)

cpe:2.3:a:civetweb_project:civetweb:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:21

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf -
References () https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory
References () https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ - Mailing List, Third Party Advisory () https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ - Mailing List, Third Party Advisory
References () https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/ - Exploit, Third Party Advisory () https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/ - Exploit, Third Party Advisory

Information

Published : 2021-10-21 16:15

Updated : 2024-11-21 05:21


NVD link : CVE-2020-27304

Mitre link : CVE-2020-27304

CVE.ORG link : CVE-2020-27304


JSON object : View

Products Affected

siemens

  • sinec_infrastructure_network_services

civetweb_project

  • civetweb
CWE
CWE-23

Relative Path Traversal

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')