CVE-2021-23772
Arbitrary File Write
Severity Score
8.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder.
Esto afecta a todas las versiones del paquete github.com/kataras/iris; todas las versiones del paquete github.com/kataras/iris/v12. Un manejo no seguro de los nombres de archivo durante la carga usando el método UploadFormFiles puede permitir a atacantes escribir en ubicaciones arbitrarias fuera de la carpeta de destino designada
*Credits:
Snyk Security Team
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2021-01-08 CVE Reserved
- 2021-12-24 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- 2024-11-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169 | 2024-09-16 | |
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170 | 2024-09-16 |
URL | Date | SRC |
---|---|---|
https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08 | 2022-01-04 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Iris-go Search vendor "Iris-go" | Iris Search vendor "Iris-go" for product "Iris" | <= 12.1.8 Search vendor "Iris-go" for product "Iris" and version " <= 12.1.8" | go |
Affected
| in | Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.7.5 Search vendor "Golang" for product "Go" and version " < 1.7.5" | - |
Safe
|
Iris-go Search vendor "Iris-go" | Iris Search vendor "Iris-go" for product "Iris" | 12.2.0 Search vendor "Iris-go" for product "Iris" and version "12.2.0" | alpha, go |
Affected
| in | Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.7.5 Search vendor "Golang" for product "Go" and version " < 1.7.5" | - |
Safe
|
Iris-go Search vendor "Iris-go" | Iris Search vendor "Iris-go" for product "Iris" | 12.2.0 Search vendor "Iris-go" for product "Iris" and version "12.2.0" | alpha2, go |
Affected
| in | Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.7.5 Search vendor "Golang" for product "Go" and version " < 1.7.5" | - |
Safe
|
Iris-go Search vendor "Iris-go" | Iris Search vendor "Iris-go" for product "Iris" | 12.2.0 Search vendor "Iris-go" for product "Iris" and version "12.2.0" | alpha3, go |
Affected
| in | Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.7.5 Search vendor "Golang" for product "Go" and version " < 1.7.5" | - |
Safe
|
Iris-go Search vendor "Iris-go" | Iris Search vendor "Iris-go" for product "Iris" | 12.2.0 Search vendor "Iris-go" for product "Iris" and version "12.2.0" | alpha4, go |
Affected
| in | Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.7.5 Search vendor "Golang" for product "Go" and version " < 1.7.5" | - |
Safe
|
Iris-go Search vendor "Iris-go" | Iris Search vendor "Iris-go" for product "Iris" | 12.2.0 Search vendor "Iris-go" for product "Iris" and version "12.2.0" | alpha5, go |
Affected
| in | Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.7.5 Search vendor "Golang" for product "Go" and version " < 1.7.5" | - |
Safe
|