Sanic is an opensource python web server/framework. Affected versions of sanic allow access to lateral directories when using `app.static` if using encoded `%2F` URLs. Parent directory traversal is not impacted. Users are advised to upgrade. There is no known workaround for this issue.
References
Link | Resource |
---|---|
https://github.com/sanic-org/sanic/issues/2478 | Exploit Issue Tracking Third Party Advisory |
https://github.com/sanic-org/sanic/pull/2495 | Patch Third Party Advisory |
https://github.com/sanic-org/sanic/security/advisories/GHSA-8cw9-5hmv-77w6 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-08-01 22:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-35920
Mitre link : CVE-2022-35920
CVE.ORG link : CVE-2022-35920
JSON object : View
Products Affected
sanic_project
- sanic
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')