{"id":"RUSTSEC-2022-0043","summary":"Improper validation of Windows paths could lead to directory traversal attack","details":"`tower_http::services::fs::ServeDir` didn't correctly validate Windows paths\nmeaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed\nand respond with the contents of `c:/windows/web/screen/img101.png`. Thus users\ncould potentially read files anywhere on the filesystem.\n\nThis only impacts Windows. Linux and other unix likes are not impacted by this.\n\nSee [tower-http#204] for more details.\n\n[tower-http#204]: https://github.com/tower-rs/tower-http/pull/204","aliases":["GHSA-qrqq-9c63-xfrg"],"modified":"2023-11-08T04:22:23.525783Z","published":"2022-01-21T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/tower-http"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2022-0043.html"},{"type":"WEB","url":"https://github.com/tower-rs/tower-http/pull/204"}],"affected":[{"package":{"name":"tower-http","ecosystem":"crates.io","purl":"pkg:cargo/tower-http"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.1.3"},{"introduced":"0.2.0"},{"fixed":"0.2.1"}]}],"ecosystem_specific":{"affected_functions":null,"affects":{"functions":[],"arch":[],"os":["windows"]}},"database_specific":{"cvss":null,"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2022-0043.json","categories":["file-disclosure"],"informational":null}}],"schema_version":"1.7.3"}