Skip to content

Commit 84266dd

Browse files
tatianabTatiana Bradley
authored andcommitted
data/reports: add alias to GO-2020-0032.yaml
Aliases: CVE-2019-25073, GHSA-fjgq-224f-fq37 Updates #32 Fixes #1288 Change-Id: Ibc47c21fccd1ba73dcd1fa9dc318c4ab4dccb42c Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/461236 Reviewed-by: Damien Neil <dneil@google.com> Reviewed-by: Tatiana Bradley <tatiana@golang.org> Run-TryBot: Tatiana Bradley <tatiana@golang.org> TryBot-Result: Gopher Robot <gobot@golang.org>
1 parent 84da7db commit 84266dd

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

data/osv/GO-2020-0032.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@
33
"published": "2021-04-14T20:04:52Z",
44
"modified": "0001-01-01T00:00:00Z",
55
"aliases": [
6-
"CVE-2019-25073"
6+
"CVE-2019-25073",
7+
"GHSA-fjgq-224f-fq37"
78
],
89
"details": "Due to improper santization of user input, Controller.FileHandler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.",
910
"affected": [

data/reports/GO-2020-0032.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ description: |
2525
for directory traversal, allowing an attacker to read files outside of
2626
the target directory that the server has permission to read.
2727
published: 2021-04-14T20:04:52Z
28+
ghsas:
29+
- GHSA-fjgq-224f-fq37
2830
credit: '@christi3k'
2931
references:
3032
- fix: https://github.com/goadesign/goa/pull/2388

0 commit comments

Comments
 (0)