Skip to content

Relative Path Traversal (CWE-23) in chunked uploads

High
bytehead published GHSA-x8wj-6m73-gfqp Feb 4, 2020

Package

No package listed

Affected versions

< 2.1.4

Patched versions

1.9.3, 2.1.5

Description

Impact

The vulnerability was identified in the web service for a chunked file
upload. While the names of the POST parameters vary with the used
frontend, their values are always used in the same way to build a path
where the chunks are stored and assembled temporarily. By not validating
these parameters properly, OneupUploaderBundle is susceptible to a path
traversal vulnerability which can be exploited to upload files to
arbitrary folders on the filesystem. The assembly process can further be
misused with some restrictions to delete and copy files to other
locations.

The vulnerability can be exploited by any users that have legitimate
access to the upload functionality and can lead to arbitrary code
execution, denial of service and disclosure of confidential information.

Patches

Yes, see version 1.9.3 and 2.1.5.

References

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt
https://owasp.org/www-community/attacks/Path_Traversal

Credits:

This security vulnerability was found by Thibaud Kehler of SySS GmbH.
E-Mail: [email protected]

Severity

High

CVE ID

CVE-2020-5237

Weaknesses

No CWEs