First published: Mon Oct 18 2021(Updated: )
The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal
Credit: vuln@vdoo.com
Affected Software | Affected Version | How to fix |
---|---|---|
Civetweb Project Civetweb | >=1.8<1.15 | |
Siemens Sinec Infrastructure Network Services | <1.0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27304 is a remote code execution vulnerability found in CivetWeb (embeddable web server/library).
CVE-2020-27304 allows an attacker to execute arbitrary code by not validating uploaded filepaths when using the built-in HTTP form-based file upload mechanism.
CVE-2020-27304 has a severity rating of 9.8 (Critical).
CivetWeb version 1.15 and earlier, Civetweb Project Civetweb version 1.8 to 1.15, and Siemens Sinec Infrastructure Network Services version 1.0.1.1 are affected by CVE-2020-27304.
Apply the recommended remedy of updating to CivetWeb version 1.15.