Skip to content

Vulnerability - Directory Traversal Attacks in Loklak Instances

High
sudheesh001 published GHSA-7557-4v29-rqw6 Feb 2, 2021

Package

No package listed

Affected versions

<= 5f48476d6f06dc00d87d25def5f789db703dfe3e

Patched versions

>= 50dd69230d3cd71dab0bfa7156682ffeca8ed8b9

Description

Impact

Insufficient input validation in the APIs exposed by the loklak server allowed a directory traversal vulnerability. Any admin configuration and files readable by the app available on the hosted file system can be retrieved by the attacker. Furthermore, user-controlled content could be written to any admin config and files readable by the application.

Patches

The security vulnerability was patched in commit 50dd692 to which users need to upgrade their hosted instances of loklak.

References

https://en.wikipedia.org/wiki/Directory_traversal_attack

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

CVE-2020-15097

Weaknesses

No CWEs

Credits