External Control of File Name or Path Affecting github.com/adguardteam/adguardhome/internal/filtering package, versions <0.107.53
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMADGUARDTEAMADGUARDHOMEINTERNALFILTERING-8172650
- published 9 Oct 2024
- disclosed 8 Oct 2024
- credit Jack Moran
Introduced: 8 Oct 2024
CVE-2024-36814 Open this link in a new tabHow to fix?
Upgrade github.com/AdguardTeam/AdGuardHome/internal/filtering
to version 0.107.53 or higher.
Overview
github.com/AdguardTeam/AdGuardHome/internal/filtering is an implementation of a DNS request and response filter
Affected versions of this package are vulnerable to External Control of File Name or Path that allows copying arbitrary files from the underlying filesystem into the readable filters
directory. A user can specify any pathname readable by the application user (by default, root) as a custom filter to expose its contents.