Miggo Logo

GHSA-8v4j-7jgf-5rg9: Warp vulnerable to Path Traversal via Improper validation of Windows paths

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
1/31/2023
Updated
3/31/2023
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
warprust< 0.3.30.3.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the sanitize_path function's incomplete path validation logic in Windows environments. The commit diff shows a specific addition of colon (':') validation in this function when cfg!(windows) is true. Prior to the patch, the function only checked for backslashes and '..' patterns but didn't account for colons, which are critical for Windows drive letter specification. This allowed URL paths containing segments like 'c:' to bypass directory restrictions and access arbitrary filesystem locations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

P*t* r*solution in `w*rp::*ilt*rs::*s::*ir` *i*n't *orr**tly v*li**t* Win*ows p*t*s m**nin* p*t*s lik* `/*oo/**r/*:/win*ows/w**/s*r**n/im****.pn*` woul* ** *llow** *n* r*spon* wit* t** *ont*nts o* `*:/win*ows/w**/s*r**n/im****.pn*`. T*us us*rs *oul*

Reasoning

T** vuln*r**ility st*ms *rom t** `s*nitiz*_p*t*` *un*tion's in*ompl*t* p*t* v*li**tion lo*i* in Win*ows *nvironm*nts. T** *ommit *i** s*ows * sp**i*i* ***ition o* *olon (':') v*li**tion in t*is *un*tion w**n `***!(win*ows)` is tru*. Prior to t** p*t*