The package github.com/valyala/fasthttp before 1.34.0 are vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 06:44
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8 - Patch, Third Party Advisory | |
| References | () https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1 - Patch, Third Party Advisory | |
| References | () https://github.com/valyala/fasthttp/issues/1226 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| References | () https://github.com/valyala/fasthttp/releases/tag/v1.34.0 - Release Notes, Third Party Advisory | |
| References | () https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866 - Exploit, Patch, Third Party Advisory | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 5.0
         v3 : 5.9  | 
24 Mar 2022, 02:27
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866 - Exploit, Patch, Third Party Advisory | |
| References | (MISC) https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8 - Patch, Third Party Advisory | |
| References | (MISC) https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1 - Patch, Third Party Advisory | |
| References | (MISC) https://github.com/valyala/fasthttp/issues/1226 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| References | (MISC) https://github.com/valyala/fasthttp/releases/tag/v1.34.0 - Release Notes, Third Party Advisory | |
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:fasthttp_project:fasthttp:*:*:*:*:*:*:*:*  | 
|
| CWE | CWE-22 | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 5.0
         v3 : 7.5  | 
17 Mar 2022, 12:50
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-03-17 12:15
Updated : 2024-11-21 06:44
NVD link : CVE-2022-21221
Mitre link : CVE-2022-21221
CVE.ORG link : CVE-2022-21221
JSON object : View
Products Affected
                microsoft
- windows
 
fasthttp_project
- fasthttp
 
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
