Path Traversal in buttle
High severity
GitHub Reviewed
Published
Sep 18, 2018
to the GitHub Advisory Database
•
Updated Mar 1, 2023
Description
Published by the National Vulnerability Database
Jul 5, 2018
Published to the GitHub Advisory Database
Sep 18, 2018
Reviewed
Jun 16, 2020
Last updated
Mar 1, 2023
All versions of
buttle
are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths when fetching files.Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
References