Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-qrqq-9c63-xfrg: tower-http's improper validation of Windows paths could lead to directory traversal attack

tower_http::services::fs::ServeDir didn’t correctly validate Windows paths, meaning paths like /foo/bar/c:/windows/web/screen/img101.png would be allowed and respond with the contents of c:/windows/web/screen/img101.png. Thus users could potentially read files anywhere on the filesystem.

This only impacts Windows. Linux and other unix likes are not impacted by this.

See tower-http#204 for more details.

ghsa
#web#windows#linux#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-qrqq-9c63-xfrg

tower-http’s improper validation of Windows paths could lead to directory traversal attack

High severity GitHub Reviewed Published Aug 11, 2022

Package

cargo tower-http (Rust)

Affected versions

= 0.2.0

< 0.1.3

Patched versions

0.2.1

0.1.3

Description

tower_http::services::fs::ServeDir didn’t correctly validate Windows paths, meaning paths like /foo/bar/c:/windows/web/screen/img101.png would be allowed and respond with the contents of c:/windows/web/screen/img101.png. Thus users could potentially read files anywhere on the filesystem.

This only impacts Windows. Linux and other unix likes are not impacted by this.

See tower-http#204 for more details.

References

  • tower-rs/tower-http#204
  • https://rustsec.org/advisories/RUSTSEC-2022-0043.html

GHSA ID

GHSA-qrqq-9c63-xfrg

Source code

ghsa: Latest News

GHSA-27wf-5967-98gx: Kubernetes kubelet arbitrary command execution