
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-33896 is a directory traversal vulnerability discovered in Dino, a modern XMPP instant messenger. The vulnerability affects Dino versions before 0.1.2 and 0.2.x before 0.2.1, and was disclosed on June 7, 2021. The vulnerability was discovered by CTurt from Google (Dino Security).
The vulnerability allows directory traversal through URI-encoded path separators in file names during file transfers. When a user receives and downloads a file, the URI-encoded path separators in the filename are decoded, enabling directory traversal and creation of arbitrary files in the user's context. The vulnerability has a CVSS score of 4.7 (Medium) with the following vector: AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N. While the path separators are displayed to the user, attackers can hide them by using long filenames that get ellipsized in the middle (OSS Security).
The vulnerability allows attackers to create arbitrary files in the context of the user. While it does not permit overwriting or modifying existing files, nor control over executable flags, it could potentially lead to code execution through the creation of malicious configuration files that might affect third-party software (Dino Security).
Users should upgrade to the fixed versions: Release version 0.2.1, Release version 0.1.2, or Nightly version 0.2.0~git114.20210607.0c8d25b7. Alternatively, administrators can apply the patch from commit 0c8d25b7a3e7a10a506f1e19b868fe9b0c761495 (Dino Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."