First published: Fri Dec 24 2021(Updated: )
This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Iris Go | <=12.1.8 | |
Iris Go | =12.2.0-alpha | |
Iris Go | =12.2.0-alpha2 | |
Iris Go | =12.2.0-alpha3 | |
Iris Go | =12.2.0-alpha4 | |
Iris Go | =12.2.0-alpha5 | |
Golang | <1.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23772 has been classified as a medium severity vulnerability due to its potential impact on file upload security.
To fix CVE-2021-23772, update to the latest version of the Iris framework that addresses the file upload handling issue.
CVE-2021-23772 affects all versions of the Iris framework, including versions up to 12.1.8 and 12.2.0-alpha series.
CVE-2021-23772 relates to the unsafe handling of file names during upload, allowing attackers to exploit this to write to arbitrary locations.
No, CVE-2021-23772 is not a risk in the latest releases of the Iris framework that have implemented proper file upload security measures.