by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt removed package gnomeExtensions.openwispr-gnome-extension
- @mweinelt dismissed
Path Traversal in wisp.serve_static allows arbitrary file read
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in gleam-wisp wisp allows arbitrary file read via percent-encoded path traversal. The wisp.serve_static function is vulnerable to path traversal because sanitization runs before percent-decoding. The encoded sequence %2e%2e passes through string.replace unchanged, then uri.percent_decode converts it to .., which the OS resolves as directory traversal when the file is read. An unauthenticated attacker can read any file readable by the application process in a single HTTP request, including application source code, configuration files, secrets, and system files. This issue affects wisp: from 2.1.1 before 2.2.1.
References
Affected products
- <2.2.1
- <pkg:hex/wisp@2.2.1
- <161118c431047f7ef1ff7cabfcc38981877fdd93
- <pkg:github/gleam-wisp/wisp@161118c431047f7ef1ff7cabfcc38981877fdd93
Ignored packages (1)
pkgs.gnomeExtensions.openwispr-gnome-extension
AI-powered voice-to-text dictation for GNOME. Requires the openwispr companion engine service for recording/transcription. Uses clipboard copy/paste for output (optional auto-paste). Optional remote STT/LLM requests are sent only to user-configured providers.