CVE-2020-5237:
Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.90703%
CWE
Published
2/18/2020
Updated
2/7/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
oneup/uploader-bundle | composer | >= 2.0.0, < 2.1.5 | 2.1.5 |
oneup/uploader-bundle | composer | >= 1.0.0, < 1.9.3 | 1.9.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper handling of user-controlled parameters in path construction. Key issues included: 1) Lack of type validation for chunk indices in controller methods (allowing string-based path manipulation), 2) Missing sanitization of UUID parameters in storage methods (enabling directory traversal). The commit diff shows fixes through integer casting of indices and basename()
sanitization of UUIDs, confirming these were the vulnerable points. Multiple controllers and storage implementations shared similar vulnerable patterns as shown in NVD's parameter list and the patch changes.