CVE-2022-35920Path Traversal in Sanic

CWE-22Path Traversal3 documents3 sources
Severity
7.5HIGHNVD
EPSS
0.8%
top 26.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 1
Latest updateAug 6

Description

Sanic is an opensource python web server/framework. Affected versions of sanic allow access to lateral directories when using `app.static` if using encoded `%2F` URLs. Parent directory traversal is not impacted. Users are advised to upgrade. There is no known workaround for this issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5sanic-org/sanic< 20.12.7+2
NVDsanic_project/sanic21.0.021.12.2+2
PyPIsanic_project/sanic22.0.022.6.1+2

Patches

🔴Vulnerability Details

2
GHSA
sanic vulnerable to Path Traversal when using `app.static` if using encoded `%2F` URLs2022-08-06
OSV
sanic vulnerable to Path Traversal when using `app.static` if using encoded `%2F` URLs2022-08-06