logo

CVE-2024-55658 github.com/siyuan-note/siyuan/kernel

Package

Manager: go
Name: github.com/siyuan-note/siyuan/kernel
Vulnerable Version: >=0 <=0.0.0-20241210012039-5129ad926a21

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0024 pctl0.47223

Details

SiYuan has an arbitrary file read and path traversal via /api/export/exportResources ### Summary Siyuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. ### Impact Arbitrary File Read

Metadata

Created: 2024-12-11T18:44:50Z
Modified: 2025-06-05T21:59:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-25w9-wqfq-gwqx/GHSA-25w9-wqfq-gwqx.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-25w9-wqfq-gwqx
Finding: F063
Auto approve: 1