Description
Hermes WebUI prior to 0.51.44 - Release T contains a path traversal vulnerability in the session import endpoint that allows authenticated attackers to read arbitrary files by importing a crafted session with an unrestricted workspace value. Attackers can supply a blocked filesystem root in the workspace field and subsequently use relative paths in the session file API to access any file readable by the WebUI process.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version before 0.51.44
f00cb74f776f22f02f5eb6b39dfb389f87cc7fd3 (git)
Credits
Chia Min Jun Lennon
References
github.com/nesquena/hermes-webui/pull/2048
github.com/nesquena/hermes-webui/releases/tag/v0.51.44
github.com/nesquena/hermes-webui/pull/2048
github.com/...ommit/f00cb74f776f22f02f5eb6b39dfb389f87cc7fd3
www.vulncheck.com/...h-traversal-via-session-import-endpoint