Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. routinator
  4. ›
  5. CVE-2023-39916

CVE-2023-39916: NLnet Labs’ Routinator vulnerable to path traversal

September 13, 2023 (updated October 3, 2025)

NLnet Labs’ Routinator 0.9.0 up to and including 0.12.1 contains a possible path traversal vulnerability in the optional, off-by-default keep-rrdp-responses feature that allows users to store the content of responses received for RRDP requests. The location of these stored responses is constructed from the URL of the request. Due to insufficient sanitation of the URL, it is possible for an attacker to craft a URL that results in the response being stored outside of the directory specified for it.

References

  • github.com/NLnetLabs/routinator
  • github.com/NLnetLabs/routinator/pull/892
  • github.com/NLnetLabs/routinator/releases/tag/v0.12.2
  • github.com/advisories/GHSA-5rxf-fqch-7vqp
  • nlnetlabs.nl/downloads/routinator/CVE-2023-39916.txt
  • nvd.nist.gov/vuln/detail/CVE-2023-39916

Code Behaviors & Features

Detect and mitigate CVE-2023-39916 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.9.0 before 0.12.2

Fixed versions

  • 0.12.2

Solution

Upgrade to version 0.12.2 or above.

Impact 9.3 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-35: Path Traversal: '.../...//'

Source file

cargo/routinator/CVE-2023-39916.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 08 Dec 2025 00:20:22 +0000.