{"id":"CVE-2022-29970","details":"Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.","aliases":["GHSA-qp49-3pvw-x4m5"],"modified":"2026-04-16T04:35:12.358141931Z","published":"2022-05-02T05:15:06.767Z","related":["ALSA-2022:4587","ALSA-2022:4661","SUSE-SU-2022:1729-1","SUSE-SU-2022:2046-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00020.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00034.html"},{"type":"FIX","url":"https://github.com/sinatra/sinatra/pull/1683/commits/462c3ca1db53ed3cfc394cf5948e9c948ad1c10e"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sinatra/sinatra","events":[{"introduced":"0"},{"fixed":"44ce685218a29a58ea059b3dfd1a39db8c7dd6d5"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.2.0"}]}}],"versions":["0.0.1","0.1.0","0.1.5","0.1.6","0.1.7","0.2.0","0.2.2","0.3.0","0.3.1","0.3.2","0.3.3","0.9.0.1","0.9.0.2","0.9.1","0.9.1.1","0.9.2","1.0","1.0.a","1.0.b","1.1.0","1.1.a","1.1.b","1.2.0","1.2.0.a","1.2.0.b","1.2.0.c","1.2.0.d","1.2.1","1.3.0","1.3.1","1.3.2","1.4.0","1.4.1","1.4.2","1.4.3","2.0.0.rc3","2.0.0.rc4","2.0.0.rc5","semver","v1.0.0","v1.1.0","v1.2.0","v1.2.1","v1.3.0","v1.3.1","v1.3.2","v1.4.0","v1.4.1","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v1.4.6","v2.0.0","v2.0.0.beta2","v2.0.0.rc1","v2.0.0.rc2","v2.0.0.rc3","v2.0.0.rc4","v2.0.0.rc5","v2.0.0.rc6","v2.0.1","v2.0.1.rc1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.8","v2.0.8.1","v2.1.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-29970.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}