Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0692 Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs.
Github GHSA Github GHSA GHSA-85rf-xh54-whp3 Malicious URL drafting attack against iodines static file server may allow path traversal
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 29 Nov 2025 02:00:00 +0000

Type Values Removed Values Added
Description Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs. Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs.

Mon, 16 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-29T01:20:07.474Z

Reserved: 2024-01-04T18:44:53.108Z

Link: CVE-2024-22050

cve-icon Vulnrichment

Updated: 2024-08-01T22:35:34.791Z

cve-icon NVD

Status : Modified

Published: 2024-01-04T21:15:10.100

Modified: 2025-11-29T02:15:50.880

Link: CVE-2024-22050

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses