Vulnerabilities/

Saltcorn Server allows logged-in users to delete arbitrary files because of a path traversal vulnerability

Severity:
High

Description

A logged-in user with any role can delete arbitrary files on the filesystem by calling the sync/clean_sync_dir endpoint. The dir_name POST parameter is not validated/sanitized and is used to construct the syncDir that is deleted by calling fs.rm.

Recommendation

Update the @saltcorn/server package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
@saltcorn/server
Anything's wrong? Let us know Last updated on October 08, 2024

This issue is available in SmartScanner Professional

See Pricing