You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The maintainer(s) of the affected project have already been made aware of this vulnerability.
Description
The watchTowr post on Palo Alto Networks CVE-2024-3400 RCE also discloses a directory traversal vulnerability in the gorilla/sessions package. This vulnerability allows an authenticated user to create (and overwrite) any file or device with privileges of the application when the FilesystemStore is used. A pull request was opened by a researcher at another firm that may have co-discovered the issue at gorilla/sessions#274
The gorilla/sessions library and FilesystemStore in particular are widely used in the Go ecosystem.
I am not the discoverer of this issue, please credit watchTowr and Bishop Fox. I attempted to reach Corey Daley (one of the new gorilla maintainers) by email and slack (gophers - #gorilla), but have not seen a response yet.
The text was updated successfully, but these errors were encountered:
hdm
changed the title
gorilla/sessions: directory traversal leads to file writes (and possible) reads in FilestorageStore
gorilla/sessions: directory traversal leads to file writes (and possible) reads in FilesystemStore
Apr 17, 2024
hdm
changed the title
gorilla/sessions: directory traversal leads to file writes (and possible) reads in FilesystemStore
x/vulndb: directory traversal in gorilla/sessions leads to file writes (and possible) reads in FilesystemStore
Apr 17, 2024
Acknowledgement
Description
The watchTowr post on Palo Alto Networks CVE-2024-3400 RCE also discloses a directory traversal vulnerability in the gorilla/sessions package. This vulnerability allows an authenticated user to create (and overwrite) any file or device with privileges of the application when the FilesystemStore is used. A pull request was opened by a researcher at another firm that may have co-discovered the issue at gorilla/sessions#274
The
gorilla/sessions
library and FilesystemStore in particular are widely used in the Go ecosystem.Affected Modules, Packages, Versions and Symbols
CVE/GHSA ID
No response
Fix Commit or Pull Request
gorilla/sessions#274
References
https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/
Additional information
I am not the discoverer of this issue, please credit watchTowr and Bishop Fox. I attempted to reach Corey Daley (one of the new gorilla maintainers) by email and slack (gophers - #gorilla), but have not seen a response yet.
The text was updated successfully, but these errors were encountered: