Weave server API vulnerable to arbitrary file leak
High severity
GitHub Reviewed
Published
Jul 31, 2024
to the GitHub Advisory Database
•
Updated Aug 2, 2024
Description
Published by the National Vulnerability Database
Jul 31, 2024
Published to the GitHub Advisory Database
Jul 31, 2024
Reviewed
Jul 31, 2024
Last updated
Aug 2, 2024
The Weave server API allows remote users to fetch files from a specific directory, but due to a lack of input validation, it is possible to traverse and leak arbitrary files remotely. In various common scenarios, this allows a low-privileged user to assume the role of the server admin.
References