Directory Traversal Vulnerability in Erlang/OTP by Erlang Solutions
CVE-2020-25623
7.5HIGH
What is CVE-2020-25623?
Erlang/OTP versions 22.3.x prior to 22.3.4.6 and 23.x prior to 23.1 are susceptible to a Directory Traversal vulnerability. This issue arises when an attacker exploits the httpd component in the inets application to craft HTTP requests that can read arbitrary files on the server. Proper validation and sanitization of file paths are crucial to mitigate this vulnerability and prevent unauthorized file access.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved