漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
SignalK Server has Path Traversal leading to information disclosure
Vulnerability Description
Signal K Server is a server application that runs on a central hub in a boat. Prior to 2.20.3, a path traversal vulnerability in SignalK Server's applicationData API allows authenticated users on Windows systems to read, write, and list arbitrary files and directories on the filesystem. The validateAppId() function blocks forward slashes (/) but not backslashes (\), which are treated as directory separators by path.join() on Windows. This enables attackers to escape the intended applicationData directory. This vulnerability is fixed in 2.20.3.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Signal K Server 路径遍历漏洞
Vulnerability Description
Signal K Server是Signal K开源的一个船用中央服务器。 Signal K Server 2.20.3之前版本存在路径遍历漏洞,该漏洞源于applicationData API存在路径遍历,可能导致任意文件读写。
CVSS Information
N/A
Vulnerability Type
N/A