CVE-2022-24840: Path Traversal in django-s3file
(updated )
It was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files. The issue was discovered by the maintainer. There were no reports of the vulnerability being known to or exploited by a third party, before the release of the patch.
If the AWS_LOCATION
setting was set, traversal was limited to that location only.
If all your files handling views (like form views) require authentication or special permission, the thread is limited to privileged users.
References
- github.com/advisories/GHSA-4w8f-hjm9-xwgf
- github.com/codingjoe/django-s3file
- github.com/codingjoe/django-s3file/commit/68ccd2c621a40eb66fdd6af2be9d5fcc9c373318
- github.com/codingjoe/django-s3file/releases/tag/5.5.1
- github.com/codingjoe/django-s3file/security/advisories/GHSA-4w8f-hjm9-xwgf
- github.com/pypa/advisory-database/tree/main/vulns/django-s3file/PYSEC-2022-208.yaml
- nvd.nist.gov/vuln/detail/CVE-2022-24840
Detect and mitigate CVE-2022-24840 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →