CVE-2020-36565

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
References
Link Resource
https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa Patch Third Party Advisory
https://github.com/labstack/echo/pull/1718 Exploit Patch Third Party Advisory
https://pkg.go.dev/vuln/GO-2021-0051 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:labstack:echo:*:*:*:*:*:go:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-12-07 17:15

Updated : 2024-02-28 19:51


NVD link : CVE-2020-36565

Mitre link : CVE-2020-36565

CVE.ORG link : CVE-2020-36565


JSON object : View

Products Affected

labstack

  • echo

microsoft

  • windows
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')