Home

Description

SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. Version 3.1.16 contains a patch for the issue.

PUBLISHED Reserved 2024-12-10 | Published 2024-12-11 | Updated 2024-12-12 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 3.1.16
affected

References

github.com/...siyuan/security/advisories/GHSA-25w9-wqfq-gwqx

github.com/...ommit/e70ed57f6e4852e2bd702671aeb8eb3a47a36d71

cve.org (CVE-2024-55658)

nvd.nist.gov (CVE-2024-55658)

Download JSON