
Cloud Vulnerability DB
A community-led vulnerabilities database
A directory traversal vulnerability was discovered in Mongoose, an embedded web server, affecting versions prior to 7.6. The vulnerability (CVE-2022-25299) was disclosed on February 13, 2022, and involves unsafe handling of file names during upload operations using the mghttpupload() method (Snyk Report).
The vulnerability exists in the mghttpupload() function where file names during upload operations are not properly sanitized. This allows attackers to manipulate file paths using '../' sequences to write files outside the intended target directory. The issue stems from insufficient path validation before file operations (Snyk Blog).
The vulnerability enables attackers to write files to arbitrary locations outside the designated target folder on the system. This could lead to system compromise through unauthorized file writes, potentially affecting system integrity and security. The vulnerability received a CVSS score of 9.8 (Critical) due to its network attack vector, low attack complexity, and high impact on system integrity (Snyk Report).
The vulnerability was fixed in Mongoose version 7.6 by adding path sanitization using the removedoubledots() function to prevent directory traversal attempts. The fix ensures that file paths are properly validated before any file operations are performed (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."