
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2022-25297 affects the drogonframework/drogon package versions before 1.7.5. This security flaw involves unsafe handling of file names during upload using the HttpFile::save() method, which could enable attackers to write files to arbitrary locations outside the designated target folder. The vulnerability was disclosed on February 21, 2022 (NVD, Snyk).
The vulnerability has been assigned a CVSS v3.1 Base Score of 8.8 (High severity) with the following metrics: Attack Vector: Network, Attack Complexity: Low, Privileges Required: Low, User Interaction: None, Scope: Unchanged, and Impact scores of High for Confidentiality, Integrity, and Availability. The issue stems from improper validation of file paths during file uploads, which could allow an attacker to manipulate the file path and write files outside the intended upload directory (Snyk).
The vulnerability can lead to arbitrary file writes outside the designated upload folder, potentially allowing attackers to write files anywhere on the system. This could result in system compromise through overwriting critical files or inserting malicious content. The high CVSS impact scores for confidentiality, integrity, and availability indicate severe potential consequences if exploited (Snyk).
The recommended mitigation is to upgrade drogonframework/drogon to version 1.7.5 or higher, which contains the fix for this vulnerability. The fix implements proper path validation to prevent directory traversal attempts (GitHub PR, Snyk).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."