The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf | |
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch Third Party Advisory |
https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ | Mailing List Third Party Advisory |
https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/ | Exploit Third Party Advisory |
Configurations
History
14 Jun 2022, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Apr 2022, 19:28
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:* |
10 Mar 2022, 17:41
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Oct 2021, 15:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CWE | CWE-22 | |
CPE | cpe:2.3:a:civetweb_project:civetweb:*:*:*:*:*:*:*:* | |
References | (MISC) https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/ - Exploit, Third Party Advisory | |
References | (MISC) https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ - Mailing List, Third Party Advisory |
21 Oct 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-21 16:15
Updated : 2024-02-04 22:08
NVD link : CVE-2020-27304
Mitre link : CVE-2020-27304
CVE.ORG link : CVE-2020-27304
JSON object : View
Products Affected
civetweb_project
- civetweb
siemens
- sinec_infrastructure_network_services