Miggo Logo

GHSA-cpmr-mw4j-99r7: Nginx alias path traversal allows unauthenticated attackers to read all files on /label_studio/core/

7.5

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
3/24/2023
Updated
11/8/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
label-studiopip<= 1.7.11.7.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from an Nginx configuration error rather than specific application code functions. The misconfigured 'location /static' directive (missing trailing slash) in deploy/default.conf allows path traversal. While this is a critical server configuration flaw, there are no traditional code functions involved - the vulnerability exists purely in the static web server configuration file structure. The fix involved modifying location blocks in the Nginx config, not application logic.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T** vuln*r**ility r*si**s on t** N*inx *on*i* *il*: *ttps://*it*u*.*om/***rt*xl**s/l***l-stu*io/*lo*/****************************************/**ploy/****ult.*on*#L*** T** p*tt*rn on lo**tion /st*ti* in*i**t*s * popul*r mis*on*i*ur*tion o

Reasoning

T** vuln*r**ility st*ms *rom *n N*inx *on*i*ur*tion *rror r*t**r t**n sp**i*i* *ppli**tion *o** *un*tions. T** mis*on*i*ur** 'lo**tion /st*ti*' *ir**tiv* (missin* tr*ilin* sl*s*) in `**ploy/****ult.*on*` *llows p*t* tr*v*rs*l. W*il* t*is is * *riti**