Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7748 | Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. |
Github GHSA |
GHSA-vp56-r7qv-783v | ahh vulnerable to Path Traversal |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 11 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-04-11T16:14:33.866Z
Reserved: 2022-07-29T16:03:51.232Z
Link: CVE-2020-36559
Updated: 2024-08-04T17:30:08.397Z
Status : Modified
Published: 2022-12-27T22:15:11.500
Modified: 2025-04-11T17:15:34.003
Link: CVE-2020-36559
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA