GHSA-PMV9-3XQP-8W42
Vulnerability from github – Published: 2024-09-18 17:49 – Updated: 2024-09-18 19:22
VLAI?
Summary
Mesop has a local file Inclusion via static file serving functionality
Details
A vulnerability has been discovered and fixed in Mesop that could potentially allow unauthorized access to files on the server hosting the Mesop application. The vulnerability was related to insufficient input validation in a specific endpoint. This could have allowed an attacker to access files not intended to be served.
Users are strongly advised to update to the latest version of Mesop immediately. The latest version includes a fix for this vulnerability.
We would like to thank @Letm3through for reporting this issue and proposing mitigations to address this issue.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "mesop"
},
"ranges": [
{
"events": [
{
"introduced": "0.9.0"
},
{
"fixed": "0.12.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-45601"
],
"database_specific": {
"cwe_ids": [
"CWE-20",
"CWE-22"
],
"github_reviewed": true,
"github_reviewed_at": "2024-09-18T17:49:02Z",
"nvd_published_at": "2024-09-18T18:15:06Z",
"severity": "HIGH"
},
"details": "A vulnerability has been discovered and fixed in Mesop that could potentially allow unauthorized access to files on the server hosting the Mesop application. The vulnerability was related to insufficient input validation in a specific endpoint. This could have allowed an attacker to access files not intended to be served.\n\nUsers are strongly advised to update to the latest version of Mesop immediately. The latest version includes a fix for this vulnerability.\n\nWe would like to thank @Letm3through for reporting this issue and proposing mitigations to address this issue.",
"id": "GHSA-pmv9-3xqp-8w42",
"modified": "2024-09-18T19:22:38Z",
"published": "2024-09-18T17:49:02Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/google/mesop/security/advisories/GHSA-pmv9-3xqp-8w42"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45601"
},
{
"type": "WEB",
"url": "https://github.com/google/mesop/commit/17fb769d6a91f0a8cbccfab18f64977b158a6a31"
},
{
"type": "PACKAGE",
"url": "https://github.com/google/mesop"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Mesop has a local file Inclusion via static file serving functionality"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…