Path Traversal Affecting github.com/owncast/owncast/controllers/admin package, versions <0.1.3
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMOWNCASTOWNCASTCONTROLLERSADMIN-6669946
- published 21 Apr 2024
- disclosed 19 Apr 2024
- credit Tony Torralba
Introduced: 19 Apr 2024
CVE-2024-31450 Open this link in a new tabHow to fix?
Upgrade github.com/owncast/owncast/controllers/admin
to version 0.1.3 or higher.
Overview
github.com/owncast/owncast/controllers/admin is a module for live stream video and chat
Affected versions of this package are vulnerable to Path Traversal via the DeleteCustomEmoji()
function in the emoji/delete
endpoint of the /api/admin
API. Admin users can delete arbitrary files on the system, outside of the emoji directory, by supplying a malicious filepath in the JSON input.
PoC
curl -X 'POST' \
-H 'Authorization: Basic <ADMIN_CREDENTIALS>' \
--data '{"name":"../../../../../../../tmp/test"}' \
'http://(victim_server):8080/api/admin/emoji/delete'
CVSS Scores
version 3.1