icon

We found results for “

WS-2020-0147

Date: August 18, 2020

The client software downloaded a list of servers from mozilla’s servers and created local files named after the hostname field in the json document. No verification of the content of the string was made, and it could therefore have included ‘../’ leading to path traversal. This allows an attacker in controll of mozilla’s servers to overwrite/create local files named .conf. The flaw was corrected by sanitizing the hostname field.

Language: RUST

Severity Score

Severity Score

Weakness Type (CWE)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-22

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us