CVE-2023-40297: Stakater Forecastle has a directory traversal vulnerability
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.84039%
CWE
Published
5/15/2024
Updated
5/16/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/stakater/Forecastle | go | <= 1.0.139 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves improper path sanitization of URL-encoded backslashes (%5C) in the website component. The attack vector demonstrates that un-sanitized URL paths are used to access files (e.g., /%5C../etc/passwd). In Go web applications, static file handlers (often using http.ServeFile or http.Dir) are common locations for such vulnerabilities. The function name and path are inferred from standard project structures and the nature of the vulnerability, as the static file controller would be responsible for serving web assets. The confidence is high because the vulnerability pattern matches classic path traversal flaws in file-serving handlers that don't properly normalize both forward and backward slashes after URL decoding.