CVE-2020-36565

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
References
Link Resource
https://pkg.go.dev/vuln/GO-2021-0051 Release Notes Vendor Advisory
https://github.com/labstack/echo/pull/1718 Exploit Patch Third Party Advisory
https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:labstack:echo:*:*:*:*:*:go:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Information

Published : 2022-12-07 09:15

Updated : 2022-12-12 07:18


NVD link : CVE-2020-36565

Mitre link : CVE-2020-36565


JSON object : View

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Advertisement

dedicated server usa

Products Affected

labstack

  • echo

microsoft

  • windows