Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7655 | Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. |
Github GHSA |
GHSA-j453-hm5x-c46w | Echo vulnerable to directory traversal |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 23 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-04-23T15:38:30.467Z
Reserved: 2022-07-29T18:52:35.508Z
Link: CVE-2020-36565
Updated: 2024-08-04T17:30:08.318Z
Status : Modified
Published: 2022-12-07T17:15:09.910
Modified: 2025-04-23T16:15:20.650
Link: CVE-2020-36565
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA