Lucene search

K
githubGitHub Advisory DatabaseGHSA-QG5V-JW6F-RPFJ
HistoryMay 14, 2022 - 1:52 a.m.

SabreDAV Directory Traversal vulnerability

2022-05-1401:52:20
CWE-20
CWE-22
GitHub Advisory Database
github.com
10
sabredav
directory traversal
html\browser plugin
windows
remote attackers
arbitrary files

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.002

Percentile

55.5%

The HTML\Browser plugin in SabreDAV before 1.6.9, 1.7.x before 1.7.7, and 1.8.x before 1.8.5, as used in ownCloud, when running on Windows, does not properly check path separators in the base path, which allows remote attackers to read arbitrary files via a \ (backslash) character.

Affected configurations

Vulners
Node
sabredavRange<1.6.9
OR
sabredavRange<1.8.5
OR
sabredavRange<1.7.7
VendorProductVersionCPE
sabredav*cpe:2.3:a:sabre:dav:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.002

Percentile

55.5%