The operatorequals/wormnest repository through 0.4.7 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/github/securitylab/issues/669#issuecomment-1117265726 | Exploit Issue Tracking Third Party Advisory | 
| https://github.com/operatorequals/wormnest/commit/2dfe96fc2570586ac487b399ac20d41b3c114861 | Patch Third Party Advisory | 
Configurations
                    Information
                Published : 2022-07-10 18:15
Updated : 2022-07-15 05:09
NVD link : CVE-2022-31502
Mitre link : CVE-2022-31502
JSON object : View
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
                wormnest_project
- wormnest


