EIQ-2020-0016
ID |
EIQ-2020-0016 |
CVE |
- |
Description |
lxml can enable arbitrary file write |
Date |
07 Dec 2020 |
Severity |
2 - MEDIUM |
CVSSv3 score |
5.3 |
Status |
2.9.0 |
Assessment |
lxml versions 4.3.5 and earlier can enable arbitrary file write through path traversal. URL parsing may wrongly interpret the % URL escape character in file paths. By exploiting this vulnerability, potential attackers can break out of the web server's root directory, and they may be able to access files in other directories. To exploit the vulnerability, a potential attacker would need:
|
Mitigation |
The issue is fixed in lxml versions 4.4.0 and later. To mitigate this vulnerability:
|
Affected versions |
2.8.0 and earlier. |
Notes |
For more information, see: This section is not visible to users accessing the public docs, it's for internal reference See also: |
< Back to all security issues and mitigation actions
In release notes 2.9.0