Closed ktg9 closed 2 years ago
:tada: This issue has been resolved in version 1.1.1 :tada:
The release is available on:
v1.1.1
Your semantic-release bot :package::rocket:
Hi there, could you please validate the issue on huntr.dev for me? Here is the link https://huntr.dev/bounties/63138b59-6c92-4581-aac4-57f42baf1af4/
@jerivas could you validate this for me? https://huntr.dev/bounties/63138b59-6c92-4581-aac4-57f42baf1af4/
I marked the report as valid, but it was created against Mezzanine and I can't report the fix since it was applied to filebrowser_safe. Could you update the report to relate it to this repo?
HI there @jerivas , I tried and think that there's no way we can update the report to relate to this repo. So I think we just leave like that.
Is there an existing issue for this?
Current Behavior
Hi there, I would like to report a path traversal in mezzanine. The request /admin/media-library/browse/?o=date&ot=desc&dir= is used to retrieved files and folder in directory inside Media Library management. However, dir is not checked for path traversal and thus allowing hackers to retrieve file all file contents under /media folder.
Expected Behavior
Mezzanine should have blocked the use of .. in path request
Steps To Reproduce
I will use your demo site as an example
Environment
Anything else?
No response