Vulnerability Report: GO-2024-2730
- Affects: github.com/gorilla/sessions
- Published: Apr 17, 2024
- Modified: Apr 17, 2024
(This report has been withdrawn on the grounds that it generates too many false positives. Session IDs are documented as not being suitable to hold user-provided data.) FilesystemStore does not sanitize the Session.ID value, making it vulnerable to directory traversal attacks. If an attacker has control over the contents of the session ID, this can be exploited to write to arbitrary files in the filesystem. Programs which do not set session IDs explicitly, or which only set session IDs that will not be interpreted by the filesystem, are not vulnerable.
Affected Packages
-
PathVersionsSymbols
-
all versions, no known fixed
References
Feedback
See anything missing or incorrect?
Suggest an edit to this report.