CVE-2020-36565

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:labstack:echo:*:*:*:*:*:go:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:29

Type Values Removed Values Added
References () https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa - Patch, Third Party Advisory () https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa - Patch, Third Party Advisory
References () https://github.com/labstack/echo/pull/1718 - Exploit, Patch, Third Party Advisory () https://github.com/labstack/echo/pull/1718 - Exploit, Patch, Third Party Advisory
References () https://pkg.go.dev/vuln/GO-2021-0051 - Release Notes, Vendor Advisory () https://pkg.go.dev/vuln/GO-2021-0051 - Release Notes, Vendor Advisory

Information

Published : 2022-12-07 17:15

Updated : 2024-11-21 05:29


NVD link : CVE-2020-36565

Mitre link : CVE-2020-36565

CVE.ORG link : CVE-2020-36565


JSON object : View

Products Affected

labstack

  • echo

microsoft

  • windows
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')