melisplatform/melis-asset-manager vulnerable to Path Traversal
High severity
GitHub Reviewed
Published
Oct 11, 2022
in
melisplatform/melis-asset-manager
•
Updated Jan 28, 2023
Package
Affected versions
< 5.0.1
Patched versions
5.0.1
Description
Published by the National Vulnerability Database
Oct 11, 2022
Published to the GitHub Advisory Database
Oct 11, 2022
Reviewed
Oct 11, 2022
Last updated
Jan 28, 2023
Impact
Attackers can read arbitrary files on affected versions of
melisplatform/melis-asset-manager
, leading to the disclosure of sensitive information. Conducting this attack does not require authentication.Users should immediately upgrade to
melisplatform/melis-asset-manager
>= 5.0.1.Patches
This issue was addressed by restricting access to files to intended directories only.
References
For more information
If you have any questions or comments about this advisory, you can contact:
References