{"id":"RUSTSEC-2021-0135","summary":"Improper validation of Windows paths could lead to directory traversal attack","details":"`tower_http::services::fs::ServeDir` didn't correctly validate Windows paths\nmeaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed\nand respond with the contents of `c:/windows/web/screen/img101.png`. Thus users\ncould potentially read files anywhere on the filesystem.\n\nThis only impacts Windows. Linux and other unix likes are not impacted by this.\n\nSee [tower-http#204] for more details.\n\n[tower-http#204]: https://github.com/tower-rs/tower-http/pull/204","modified":"2023-06-13T13:10:24Z","published":"2021-01-21T12:00:00Z","withdrawn":"2022-08-14T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/tower-http"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2021-0135.html"},{"type":"WEB","url":"https://github.com/tower-rs/tower-http/pull/204"}],"affected":[{"package":{"name":"tower-http","ecosystem":"crates.io","purl":"pkg:cargo/tower-http"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.1.3"},{"introduced":"0.2.0"},{"fixed":"0.2.1"}]}],"ecosystem_specific":{"affects":{"os":["windows"],"arch":[],"functions":[]},"affected_functions":null},"database_specific":{"informational":null,"categories":["file-disclosure"],"cvss":null,"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2021-0135.json"}}],"schema_version":"1.7.3"}