Headline
GHSA-qwf7-rv77-fcr3: Duplicate Advisory: Malicious URL drafting attack against iodines static file server may allow path traversal
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-85rf-xh54-whp3. This link is maintained to preserve external references.
Original Description
Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs.
Skip to content
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
- Pricing
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-qwf7-rv77-fcr3
Duplicate Advisory: Malicious URL drafting attack against iodines static file server may allow path traversal
Low severity GitHub Reviewed Published Jan 4, 2024 to the GitHub Advisory Database • Updated Jan 5, 2024
Withdrawn This advisory was withdrawn on Jan 5, 2024
Package
Affected versions
< 0.7.33
Description
Published by the National Vulnerability Database
Jan 4, 2024
Published to the GitHub Advisory Database
Jan 4, 2024