{"id":"CVE-2022-29970","details":"Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.","aliases":["GHSA-qp49-3pvw-x4m5"],"modified":"2026-05-01T04:12:05.550953Z","published":"2022-05-02T00:00:00Z","related":["ALSA-2022:4587","ALSA-2022:4661","SUSE-SU-2022:1729-1","SUSE-SU-2022:2046-1"],"database_specific":{"cna_assigner":"mitre","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/29xxx/CVE-2022-29970.json"},"references":[{"type":"WEB","url":"https://github.com/sinatra/sinatra/pull/1683/commits/462c3ca1db53ed3cfc394cf5948e9c948ad1c10e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/29xxx/CVE-2022-29970.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29970"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00034.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sinatra/sinatra","events":[{"introduced":"0"},{"fixed":"44ce685218a29a58ea059b3dfd1a39db8c7dd6d5"}]}],"versions":["0.0.1","0.1.0","0.1.5","0.1.6","0.1.7","0.2.0","0.2.2","0.3.0","0.3.1","0.3.2","0.3.3","0.9.0.1","0.9.0.2","0.9.1","0.9.1.1","0.9.2","1.0","1.0.a","1.0.b","1.1.0","1.1.a","1.1.b","1.2.0","1.2.0.a","1.2.0.b","1.2.0.c","1.2.0.d","1.2.1","1.3.0","1.3.1","1.3.2","1.4.0","1.4.1","1.4.2","1.4.3","2.0.0.rc3","2.0.0.rc4","2.0.0.rc5","semver","v1.0.0","v1.1.0","v1.2.0","v1.2.1","v1.3.0","v1.3.1","v1.3.2","v1.4.0","v1.4.1","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v1.4.6","v2.0.0","v2.0.0.beta2","v2.0.0.rc1","v2.0.0.rc2","v2.0.0.rc3","v2.0.0.rc4","v2.0.0.rc5","v2.0.0.rc6","v2.0.1","v2.0.1.rc1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.8","v2.0.8.1","v2.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-29970.json"}}],"schema_version":"1.7.5"}