We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-55658

SiYuan has an arbitrary file read and path traversal via /api/export/exportResources



Description

SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. Version 3.1.16 contains a patch for the issue.

Reserved 2024-12-10 | Published 2024-12-11 | Updated 2024-12-12 | Assigner GitHub_M


HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 3.1.16
affected

References

github.com/...siyuan/security/advisories/GHSA-25w9-wqfq-gwqx

github.com/...ommit/e70ed57f6e4852e2bd702671aeb8eb3a47a36d71

cve.org (CVE-2024-55658)

nvd.nist.gov (CVE-2024-55658)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-55658

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.