This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder.
References
Link | Resource |
---|---|
https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170 | Exploit Patch Third Party Advisory |
https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170 | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08 - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169 - Exploit, Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170 - Exploit, Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.5 |
04 Jan 2022, 20:11
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169 - Exploit, Patch, Third Party Advisory | |
References | (CONFIRM) https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08 - Patch, Third Party Advisory | |
References | (CONFIRM) https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170 - Exploit, Patch, Third Party Advisory | |
CPE | cpe:2.3:a:iris-go:iris:12.2.0:alpha5:*:*:*:go:*:* cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* cpe:2.3:a:iris-go:iris:12.2.0:alpha:*:*:*:go:*:* cpe:2.3:a:iris-go:iris:*:*:*:*:*:go:*:* cpe:2.3:a:iris-go:iris:12.2.0:alpha3:*:*:*:go:*:* cpe:2.3:a:iris-go:iris:12.2.0:alpha2:*:*:*:go:*:* cpe:2.3:a:iris-go:iris:12.2.0:alpha4:*:*:*:go:*:* |
|
CWE | CWE-59 | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
24 Dec 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary | This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder. |
24 Dec 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-24 12:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23772
Mitre link : CVE-2021-23772
CVE.ORG link : CVE-2021-23772
JSON object : View
Products Affected
golang
- go
iris-go
- iris
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')