Directory traversal in RStudio Shiny Server before 1.5.16 allows attackers to read the application source code, involving an encoded slash.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/colemanjp/shinyserver-directory-traversal-source-code-leak | third party advisory exploit |
https://blog.rstudio.com/2021/01/13/shiny-server-1-5-16-update/ | vendor advisory |