CVE-2018-25059
CVSS V2 None
CVSS V3 None
Description
A vulnerability was found in pastebinit up to 0.2.2 and classified as problematic. Affected by this issue is the function pasteHandler of the file server.go. The manipulation of the argument r.URL.Path leads to path traversal. Upgrading to version 0.2.3 is able to address this issue. The name of the patch is 1af2facb6d95976c532b7f8f82747d454a092272. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217040.
Overview
- CVE ID
- CVE-2018-25059
- Assigner
- cna@vuldb.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-12-30T11:15:10
- Last Modified Date
- 2023-01-09T18:16:12
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:pastebinit_project:pastebinit:*:*:*:*:*:*:*:* | 1 | OR | 0.2.2 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2018-25059 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25059 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-30 12:15:12 | Added to TrackCVE | |||
2022-12-30 12:15:12 | Weakness Enumeration | new | ||
2022-12-30 13:14:33 | 2022-12-30T13:06:49 | CVE Modified Date | updated | |
2022-12-30 13:14:33 | Received | Awaiting Analysis | Vulnerability Status | updated |
2022-12-30 13:14:37 | A vulnerability was found in pastebinit up to 0.2.2 and classified as critical. Affected by this issue is the function pasteHandler of the file server.go. The manipulation of the argument r.URL.Path leads to path traversal. Upgrading to version 0.2.3 is able to address this issue. The name of the patch is 1af2facb6d95976c532b7f8f82747d454a092272. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217040. | A vulnerability was found in pastebinit up to 0.2.2 and classified as problematic. Affected by this issue is the function pasteHandler of the file server.go. The manipulation of the argument r.URL.Path leads to path traversal. Upgrading to version 0.2.3 is able to address this issue. The name of the patch is 1af2facb6d95976c532b7f8f82747d454a092272. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217040. | Description | updated |
2022-12-30 13:14:40 | CVSS V3 information | new | ||
2022-12-30 13:14:40 | CVSS V2 information | new | ||
2023-01-05 12:18:54 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-05 12:18:57 | CVSS V3 information | new | ||
2023-01-05 12:18:57 | CVSS V2 information | new | ||
2023-01-09 18:24:13 | 2023-01-09T18:16:12 | CVE Modified Date | updated | |
2023-01-09 18:24:13 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-09 18:24:15 | CPE Information | updated | ||
2023-01-09 18:24:15 | CVSS V3 information | new | ||
2023-01-09 18:24:15 | CVSS V2 information | new |