You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The maintainer(s) of the affected project have already been made aware of this vulnerability.
Description
The watchTowr post on Palo Alto Networks CVE-2024-3400 RCE also discloses a directory traversal vulnerability in the gorilla/sessions package. This vulnerability allows an authenticated user to create (and overwrite) any file or device with privileges of the application when the FilesystemStore is used. A pull request was opened by a researcher at another firm that may have co-discovered the issue at gorilla/sessions#274
The gorilla/sessions library and FilesystemStore in particular are widely used in the Go ecosystem.
I am not the discoverer of this issue, please credit watchTowr and Bishop Fox. I attempted to reach Corey Daley (one of the new gorilla maintainers) by email and slack (gophers - #gorilla), but have not seen a response yet.