First published: Mon Jul 11 2022(Updated: )
The Luxas98/logstash-management-api repository through 2020-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Logstash Management API | <=2020-05-04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31520 is categorized as a high severity vulnerability due to its potential for absolute path traversal.
To fix CVE-2022-31520, update your version of the logstash-management-api to a release after 2020-05-04.
CVE-2022-31520 is an absolute path traversal vulnerability affecting the logstash-management-api.
Users of the logstash-management-api version 2020-05-04 and earlier are affected by CVE-2022-31520.
CVE-2022-31520 could allow an attacker to read unauthorized files from the server's file system.