logo

CVE-2020-5237 oneup/uploader-bundle

Package

Manager: composer
Name: oneup/uploader-bundle
Vulnerable Version: >=2.0.0 <2.1.5 || >=1.0.0 <1.9.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.06585 pctl0.90784

Details

Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle ### Impact The vulnerability was identified in the web service for a chunked file upload. While the names of the POST parameters vary with the used frontend, their values are always used in the same way to build a path where the chunks are stored and assembled temporarily. By not validating these parameters properly, OneupUploaderBundle is susceptible to a path traversal vulnerability which can be exploited to upload files to arbitrary folders on the filesystem. The assembly process can further be misused with some restrictions to delete and copy files to other locations. The vulnerability can be exploited by any users that have legitimate access to the upload functionality and can lead to arbitrary code execution, denial of service and disclosure of confidential information. ### Patches Yes, see version 1.9.3 and 2.1.5. ### References https://owasp.org/www-community/attacks/Path_Traversal ### Credits: This security vulnerability was found by Thibaud Kehler of SySS GmbH. E-Mail: thibaud.kehler@syss.de

Metadata

Created: 2020-02-18T18:59:24Z
Modified: 2021-01-08T20:30:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/02/GHSA-x8wj-6m73-gfqp/GHSA-x8wj-6m73-gfqp.json
CWE IDs: ["CWE-22", "CWE-23"]
Alternative ID: GHSA-x8wj-6m73-gfqp
Finding: F063
Auto approve: 1