漏洞信息详情
fstream 后置链接漏洞
漏洞简介
fstream是一个用于读取和写入文件的库。
fstream 1.0.12之前版本中的‘fstream.DirWriter()’函数存在后置链接漏洞。该漏洞源于网络系统或产品未正确过滤表示非预期资源的链接或者快捷方式的文件名。攻击者可利用该漏洞访问非法的文件路径。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22
参考网址
来源:MISC
链接:https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html
来源:www.npmjs.com
链接:https://www.npmjs.com/advisories/886
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192099-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192081-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192181-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192078-1.html
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4123-1/
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914246-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192055-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200059-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2944/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3007/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3007.3/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3379/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4645/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-13173
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0100/
受影响实体
暂无
补丁
- fstream 安全漏洞的修复措施<!--2019-7-2-->
还没有评论,来说两句吧...