This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169 | Exploit Patch Third Party Advisory |
https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170 | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-12-24 04:15
Updated : 2022-01-04 12:11
NVD link : CVE-2021-23772
Mitre link : CVE-2021-23772
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
golang
- go
iris-go
- iris