The File Session Manager in Beego 1.10.0 allows local users to read session files because there is a race condition involving file creation within a directory with weak permissions.
4.7CVSS
4.3AI Score
0.0004EPSS
The File Session Manager in Beego 1.10.0 allows local users to read session files because of weak permissions for individual files.
5.5CVSS
5.1AI Score
0.0004EPSS
An issue was discovered in file profile.go in function MemProf in beego through 2.0.2, allows attackers to launch symlink attacks locally.
7.8CVSS
7.4AI Score
0.0005EPSS
An issue was discovered in file profile.go in function GetCPUProfile in beego through 2.0.2, allows attackers to launch symlink attacks locally.
7.8CVSS
7.4AI Score
0.0005EPSS
An issue was discovered in the route lookup process in beego before 1.12.11 that allows attackers to bypass access control.
9.8CVSS
9.2AI Score
0.003EPSS
Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the "Request Statistics" page.
6.1CVSS
5.9AI Score
0.001EPSS
The route lookup process in beego before 1.12.9 and 2.x before 2.0.3 allows attackers to bypass access control. When a /p1/p2/:name route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).
9.8CVSS
9.2AI Score
0.002EPSS
The leafInfo.match() function in Beego v2.0.3 and below uses path.join() to deal with wildcardvalues which can lead to cross directory risk.
9.8CVSS
9.2AI Score
0.001EPSS
An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the sendMail function located in beego/core/logs/smtp.go file
8.8CVSS
7.3AI Score
0.001EPSS
An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file
8.8CVSS
7.3AI Score
0.001EPSS