logo

CVE-2017-1000052 plug

Package

Manager: erlang
Name: plug
Vulnerable Version: >=0 <1.0.4 || >=1.1.0 <1.1.7 || >=1.2.0 <1.2.3 || >=1.3.0 <1.3.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00246 pctl0.47765

Details

Null Byte Injection in Plug.Static Plug.Static is used for serving static assets, and is vulnerable to null byte injection. If file upload functionality is provided, this can allow users to bypass filetype restrictions. We recommend all applications that provide file upload functionality and serve those uploaded files locally with Plug.Static to upgrade immediately or include the fix below. If uploaded files are rather stored and served from S3 or any other cloud storage, you are not affected.

Metadata

Created: 2022-04-12T21:20:20Z
Modified: 2022-04-12T21:20:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-2q6v-32mr-8p8x/GHSA-2q6v-32mr-8p8x.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-2q6v-32mr-8p8x
Finding: F184
Auto approve: 1