{"id":"CVE-2020-27304","details":"The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal","modified":"2026-04-11T12:34:07.887713Z","published":"2021-10-21T16:15:07.737Z","related":["openSUSE-SU-2021:1424-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"fixed":"1.0.1.1"}]}]},"references":[{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf"},{"type":"ADVISORY","url":"https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ"},{"type":"FIX","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"type":"EVIDENCE","url":"https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/civetweb/civetweb","events":[{"introduced":"016535194f6dba8e534b6eec6b9d433e6fb0a9b2"},{"fixed":"eefb26f82b233268fc98577d265352720d477ba4"}],"database_specific":{"cpe":"cpe:2.3:a:civetweb_project:civetweb:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"1.8"},{"fixed":"1.15"}]}}],"versions":["v1.10","v1.11","v1.13","v1.14","v1.8","v1.9","v1.9.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-27304.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}