e7d Speed Test (aka speedtest) 0.5.3 allows a path-traversal attack that results in information disclosure via the "GET /.." substring.
References
Link | Resource |
---|---|
https://github.com/e7d/speedtest/releases | Release Notes Third Party Advisory |
https://old.reddit.com/r/HackingTechniques/comments/poc55t/directory_traversal_bypass_on_e7d_speedtest/ | Patch Third Party Advisory |
https://github.com/e7d/speedtest/releases | Release Notes Third Party Advisory |
https://old.reddit.com/r/HackingTechniques/comments/poc55t/directory_traversal_bypass_on_e7d_speedtest/ | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/e7d/speedtest/releases - Release Notes, Third Party Advisory | |
References | () https://old.reddit.com/r/HackingTechniques/comments/poc55t/directory_traversal_bypass_on_e7d_speedtest/ - Patch, Third Party Advisory |
Information
Published : 2021-09-27 06:15
Updated : 2024-11-21 06:23
NVD link : CVE-2021-40349
Mitre link : CVE-2021-40349
CVE.ORG link : CVE-2021-40349
JSON object : View
Products Affected
speed_test_project
- speed_test
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')