An issue was discovered in 20|20 Storage 2.11.0. A Path Traversal vulnerability in the TwentyTwenty.Storage library in the LocalStorageProvider allows creating and reading files outside of the specified basepath. If the application using this library does not sanitize user-supplied filenames, then this issue may be exploited to read or write arbitrary files. This affects LocalStorageProvider.cs.
References
Link | Resource |
---|---|
https://security401.com/twentytwenty-storage-path-traversal/ | Exploit Third Party Advisory |
https://security401.com/twentytwenty-storage-path-traversal/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://security401.com/twentytwenty-storage-path-traversal/ - Exploit, Third Party Advisory |
Information
Published : 2019-08-13 21:15
Updated : 2024-11-21 04:22
NVD link : CVE-2019-12479
Mitre link : CVE-2019-12479
CVE.ORG link : CVE-2019-12479
JSON object : View
Products Affected
twentytwenty.storage_project
- twentytwenty.storage
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')