{"id":"RUSTSEC-2022-0082","summary":"Improper validation of Windows paths could lead to directory traversal attack","details":"Path resolution in `warp::filters::fs::dir` didn't correctly validate Windows paths\nmeaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed\nand respond with the contents of `c:/windows/web/screen/img101.png`. Thus users\ncould potentially read files anywhere on the filesystem.\n\nThis only impacts Windows. Linux and other unix likes are not impacted by this.","aliases":["GHSA-8v4j-7jgf-5rg9"],"modified":"2023-11-08T04:17:31.672424Z","published":"2022-01-14T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/warp"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2022-0082.html"},{"type":"REPORT","url":"https://github.com/seanmonstar/warp/issues/937"}],"affected":[{"package":{"name":"warp","ecosystem":"crates.io","purl":"pkg:cargo/warp"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.3.3"}]}],"ecosystem_specific":{"affects":{"arch":[],"functions":[],"os":["windows"]},"affected_functions":null},"database_specific":{"categories":["file-disclosure"],"cvss":null,"informational":null,"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2022-0082.json"}}],"schema_version":"1.7.3"}