-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| phoenix-ws | pip | < 1.0.6 | 1.0.6 |
The vulnerability explicitly states that files in phoenix_files/extensions/ are exposed via HTTP GET requests. This implies the web server or framework (e.g., Flask/Django) was misconfigured to serve this directory as a static endpoint or had an unprotected route handler. While the exact function names aren't provided in the advisory, the pattern matches common web framework behaviors (e.g., a route using send_from_directory in Flask or a staticfiles configuration in Django). The high confidence stems from the direct correlation between the vulnerability description and standard static file handling mechanisms in web frameworks.
Ongoing coverage of React2Shell