Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle
High severity
GitHub Reviewed
Published
Feb 4, 2020
in
1up-lab/OneupUploaderBundle
•
Updated Feb 7, 2024
Package
Affected versions
>= 2.0.0, < 2.1.5
>= 1.0.0, < 1.9.3
Patched versions
2.1.5
1.9.3
Description
Reviewed
Feb 5, 2020
Published by the National Vulnerability Database
Feb 5, 2020
Published to the GitHub Advisory Database
Feb 18, 2020
Last updated
Feb 7, 2024
Impact
The vulnerability was identified in the web service for a chunked file
upload. While the names of the POST parameters vary with the used
frontend, their values are always used in the same way to build a path
where the chunks are stored and assembled temporarily. By not validating
these parameters properly, OneupUploaderBundle is susceptible to a path
traversal vulnerability which can be exploited to upload files to
arbitrary folders on the filesystem. The assembly process can further be
misused with some restrictions to delete and copy files to other
locations.
The vulnerability can be exploited by any users that have legitimate
access to the upload functionality and can lead to arbitrary code
execution, denial of service and disclosure of confidential information.
Patches
Yes, see version 1.9.3 and 2.1.5.
References
https://owasp.org/www-community/attacks/Path_Traversal
Credits:
This security vulnerability was found by Thibaud Kehler of SySS GmbH.
E-Mail: thibaud.kehler@syss.de
References