Path Traversal in public
High severity
GitHub Reviewed
Published
Jul 18, 2018
to the GitHub Advisory Database
•
Updated Jan 31, 2023
Description
Published by the National Vulnerability Database
Jun 7, 2018
Published to the GitHub Advisory Database
Jul 18, 2018
Reviewed
Jun 16, 2020
Last updated
Jan 31, 2023
Versions of
public
before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user.Recommendation
Update to version 0.1.3 or later.
References