GO-2023-1713

Source
https://pkg.go.dev/vuln/GO-2023-1713
Import Source
https://vuln.go.dev/ID/GO-2023-1713.json
JSON Data
https://api.test.osv.dev/v1/vulns/GO-2023-1713
Aliases
Published
2023-04-12T21:45:55Z
Modified
2024-05-20T16:03:47Z
Summary
Path traversal in github.com/sjqzhang/go-fastdfs
Details

An attacker can craft a remote request to upload a file to "/group1/upload" that uses path traversal to instead write the file contents to an attacker controlled path on the server.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2023-1713"
}
References

Affected packages

Go / github.com/sjqzhang/go-fastdfs

Package

Name
github.com/sjqzhang/go-fastdfs
View open source insights on deps.dev
Purl
pkg:golang/github.com/sjqzhang/go-fastdfs

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.5-0.20230408141131-61cbff5124c6

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/sjqzhang/go-fastdfs/server",
            "symbols": [
                "HttpHandler.ServeHTTP",
                "Server.ConsumerUpload",
                "Server.CrossOrigin",
                "Server.Download",
                "Server.DownloadNormalFileByURI",
                "Server.Start",
                "Server.Upload",
                "Server.upload",
                "Start"
            ]
        }
    ]
}