Vulnerability DatabaseGHSA-7p7c-pvvx-2vx3

GHSA-7p7c-pvvx-2vx3
Rust vulnerability analysis and mitigation

Overview

A directory traversal vulnerability was discovered in hyper-staticfile, identified as GHSA-7p7c-pvvx-2vx3, affecting versions prior to 0.9.2 and version 0.10.0-alpha.1. The vulnerability was reported on November 29, 2022, and disclosed on December 5, 2022. The issue specifically impacts Windows systems, where improper validation of Windows paths could allow attackers to access arbitrary files on the filesystem (GitHub Advisory, RustSec Advisory).

Technical details

The vulnerability stems from insufficient path validation in hyper-staticfile's path resolution mechanism. On Windows systems, the software failed to properly validate paths containing Windows drive letters, allowing requests like '/foo/bar/c:/windows/web/screen/img101.png' to access files from any location on the filesystem. This vulnerability is classified as CWE-22 and has been assigned a Moderate severity rating. The issue is specific to Windows environments, with Linux and other Unix-like systems remaining unaffected (GitHub Advisory, GitHub Issue).

Impact

The vulnerability enables attackers to potentially read files from anywhere on the filesystem of affected Windows systems. An attacker could access sensitive files by crafting specific URLs that include Windows drive letters, bypassing the intended directory restrictions (GitHub Advisory, RustSec Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 0.9.2 and 0.10.0-alpha.2. The fix involves additional validation of path components to prevent malicious use of Windows drive letters. Users should upgrade to these patched versions to protect against potential exploits (GitHub Advisory, GitHub PR).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-2fjw-whxm-9v4qCRITICAL9.3
  • RustRust
  • nftnl
NoYesNov 25, 2025
CVE-2025-66017HIGH8.2
  • RustRust
  • cggmp21
NoYesNov 25, 2025
GHSA-mj73-j457-8x9qLOW2.7
  • RustRust
  • maxminddb
NoYesDec 02, 2025
GHSA-pq5v-rwp8-p7gmLOW2.7
  • RustRust
  • rtvm-interpreter
NoNoDec 02, 2025
RUSTSEC-2025-0132N/AN/A
  • RustRust
  • maxminddb
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management