GHSA-v2gw-x5jf-pgwv

Suggest an improvement
Source
https://github.com/advisories/GHSA-v2gw-x5jf-pgwv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-v2gw-x5jf-pgwv/GHSA-v2gw-x5jf-pgwv.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-v2gw-x5jf-pgwv
Aliases
Published
2022-05-01T23:55:06Z
Modified
2024-12-03T05:40:38.438203Z
Summary
Mercurial Directory traversal vulnerability
Details

Directory traversal vulnerability in patch.py in Mercurial before 1.0.2 allows user-assisted attackers to modify arbitrary files via ".." (dot dot) sequences in a patch file.

Database specific
{
    "nvd_published_at": "2008-06-30T20:41:00Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-09-22T22:26:38Z"
}
References

Affected packages

PyPI / mercurial

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2

Affected versions

0.*

0.8.1
0.9
0.9.1
0.9.2
0.9.3
0.9.4
0.9.5

1.*

1.0
1.0.1