
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was found in pastebinit up to version 0.2.2 that allows path traversal and storage path leak in the pasteHandler function. The issue was discovered in 2018 and was fixed in version 0.2.3 (NVD, GitHub PR).
The vulnerability exists in the pasteHandler function where the application did not properly sanitize file paths, allowing path traversal attacks. The issue was fixed by properly cleaning and sanitizing the URL path using filepath.FromSlash and path.Clean functions, as well as preventing storage path disclosure in error messages (GitHub Commit).
This vulnerability could allow attackers to access files outside of the intended directory structure through path traversal, potentially exposing sensitive information on the system. Additionally, the storage path leak could provide attackers with information about the server's file system structure (GitHub PR).
Users should upgrade to pastebinit version 0.2.3 or later which includes the security fix. The fix properly sanitizes file paths and prevents storage path disclosure in error messages (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."