From 2827f80af45e1125290c70cd1be71835317b7966 Mon Sep 17 00:00:00 2001 From: "pinkforest(she/her)" <36498018+pinkforest@users.noreply.github.com> Date: Fri, 5 Aug 2022 08:06:52 +1000 Subject: [PATCH] Add tower-http 2022 version (#1320) --- crates/tower-http/RUSTSEC-0000-0000.md | 28 ++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 crates/tower-http/RUSTSEC-0000-0000.md diff --git a/crates/tower-http/RUSTSEC-0000-0000.md b/crates/tower-http/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..78c25a7 --- /dev/null +++ b/crates/tower-http/RUSTSEC-0000-0000.md @@ -0,0 +1,28 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "tower-http" +date = "2022-01-21" +url = "https://github.com/tower-rs/tower-http/pull/204" +categories = ["file-disclosure"] +keywords = ["directory traversal", "http"] + +[affected] +os = ["windows"] + +[versions] +patched = [">= 0.2.1", ">= 0.1.3, < 0.2.0"] +``` + +# Improper validation of Windows paths could lead to directory traversal attack + +`tower_http::services::fs::ServeDir` didn't correctly validate Windows paths +meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed +and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users +could potentially read files anywhere on the filesystem. + +This only impacts Windows. Linux and other unix likes are not impacted by this. + +See [tower-http#204] for more details. + +[tower-http#204]: https://github.com/tower-rs/tower-http/pull/204