CVE-2022-29180: Server-Side Request Forgery in charm
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.46769%
CWE
Published
5/24/2022
Updated
1/27/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/charmbracelet/charm | go | >= 0.9.0, < 0.12.1 | 0.12.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from unsanitized path parameters in file operations. The commit 3c90668 adds path sanitization using filepath.Clean to these three handler functions. Before the patch, they directly used pattern.Path() from request context without validation, allowing path traversal attacks via specially crafted paths. These functions directly interact with the filesystem using user-controlled input, making them the clear attack surface for SSRF and file system manipulation.