RamseyK httpserver URI src/ResourceHost.cpp getResource uri path traversal
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.0 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in RamseyK httpserver and classified as critical. This impacts the function ResourceHost::getResource of the file src/ResourceHost.cpp of the component URI Handler. The manipulation of the argument uri leads to path traversal.
This vulnerability is listed as CVE-2019-25087. The attack may be initiated remotely. There is no available exploit.
It is recommended to apply a patch to fix this issue.
Details
A vulnerability was found in RamseyK httpserver (the affected version unknown). It has been rated as critical. This issue affects the function ResourceHost::getResource of the file src/ResourceHost.cpp of the component URI Handler. The manipulation of the argument uri with an unknown input leads to a path traversal vulnerability. Using CWE to declare the problem leads to CWE-24. The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "../" sequences that can resolve to a location that is outside of that directory. Impacted is confidentiality.
The weakness was presented 12/27/2022 as 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52. It is possible to read the advisory at github.com. The identification of this vulnerability is CVE-2019-25087. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1006 according to MITRE ATT&CK.
Applying the patch 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52 is able to eliminate this problem. The bugfix is ready for download at github.com.
Be aware that VulDB is the high quality source for vulnerability data.
Product
Vendor
Name
License
Website
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.0VulDB Meta Temp Score: 6.0
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔍
CNA Base Score: 5.3
CNA Vector (VulDB): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Path traversalCWE: CWE-24 / CWE-23 / CWE-22
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52
Timeline
12/27/2022 🔍12/27/2022 🔍
12/27/2022 🔍
01/24/2023 🔍
Sources
Product: github.comAdvisory: 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52
Status: Confirmed
CVE: CVE-2019-25087 (🔍)
GCVE (CVE): GCVE-0-2019-25087
GCVE (VulDB): GCVE-100-216863
Entry
Created: 12/27/2022 09:47Updated: 01/24/2023 19:33
Changes: 12/27/2022 09:47 (43), 01/24/2023 19:17 (2), 01/24/2023 19:24 (21), 01/24/2023 19:33 (1)
Complete: 🔍
Cache ID: 216::103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.