First published: Thu Dec 02 2021(Updated: )
Armeria is an open source microservice framework. In affected versions an attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic. Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly. This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linecorp Armeria | <1.13.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Armeria is an open source microservice framework.
The vulnerability ID is CVE-2021-43795.
The severity of CVE-2021-43795 is high.
CVE-2021-43795 allows an attacker to access an Armeria server's local file system beyond its restricted directory.
An attacker can exploit CVE-2021-43795 by sending an HTTP request with a path that contains `%2F` (encoded `/`).
Update Armeria to version 1.13.4 or later to fix CVE-2021-43795.
You can find more information about CVE-2021-43795 at the following links: [link1], [link2], [link3].