Description
Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs.
Published: 2024-01-04
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-0692 Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs.
Github GHSA Github GHSA GHSA-85rf-xh54-whp3 Malicious URL drafting attack against iodines static file server may allow path traversal
History

Sat, 29 Nov 2025 02:00:00 +0000

Type Values Removed Values Added
Description Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs. Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs.

Mon, 16 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Boazsegev Iodine
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-29T01:20:07.474Z

Reserved: 2024-01-04T18:44:53.108Z

Link: CVE-2024-22050

cve-icon Vulnrichment

Updated: 2024-08-01T22:35:34.791Z

cve-icon NVD

Status : Modified

Published: 2024-01-04T21:15:10.100

Modified: 2025-11-29T02:15:50.880

Link: CVE-2024-22050

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses