Duplicate Advisory: Malicious URL drafting attack against iodines static file server may allow path traversal
Low severity
GitHub Reviewed
Published
Jan 4, 2024
to the GitHub Advisory Database
•
Updated Jan 5, 2024
Withdrawn
This advisory was withdrawn on Jan 5, 2024
Description
Published by the National Vulnerability Database
Jan 4, 2024
Published to the GitHub Advisory Database
Jan 4, 2024
Reviewed
Jan 5, 2024
Withdrawn
Jan 5, 2024
Last updated
Jan 5, 2024
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-85rf-xh54-whp3. This link is maintained to preserve external references.
Original Description
Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs.
References