CVE-2020-4039

SUSI.AI is an intelligent Open Source personal assistant. SUSI.AI Server before version d27ed0f has a directory traversal vulnerability due to insufficient input validation. Any admin config and file readable by the app can be retrieved by the attacker. Furthermore, some files can also be moved or deleted.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fossasia:susi.ai:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:32

Type Values Removed Values Added
References () https://github.com/fossasia/susi_server/security/advisories/GHSA-wcm4-2jp5-q269 - Patch, Third Party Advisory () https://github.com/fossasia/susi_server/security/advisories/GHSA-wcm4-2jp5-q269 - Patch, Third Party Advisory
CVSS v2 : 6.4
v3 : 9.1
v2 : 6.4
v3 : 8.6

05 Aug 2022, 16:16

Type Values Removed Values Added
CWE CWE-23 CWE-22

Information

Published : 2021-04-30 16:15

Updated : 2024-11-21 05:32


NVD link : CVE-2020-4039

Mitre link : CVE-2020-4039

CVE.ORG link : CVE-2020-4039


JSON object : View

Products Affected

fossasia

  • susi.ai
CWE
CWE-23

Relative Path Traversal

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')