Directory Traversal in xtalk
High severity
GitHub Reviewed
Published
Sep 1, 2020
to the GitHub Advisory Database
•
Updated Sep 11, 2023
Description
Reviewed
Aug 31, 2020
Published to the GitHub Advisory Database
Sep 1, 2020
Last updated
Sep 11, 2023
Affected versions of
xtalk
are vulnerable to directory traversal, allowing access to the filesystem by placing "../" in the URL.Example request:
Recommendation
No patch is currently available for this vulnerability, and the package has not been updated since 2014.
The best mitigation is currently to avoid using this package, and using a different, functionally equivalent package.
References