{"id":"CVE-2022-45969","details":"Alist v3.4.0 is vulnerable to Directory Traversal,","aliases":["GHSA-pmg2-rph8-p8r6","GO-2022-1171"],"modified":"2026-04-12T04:18:27.293963Z","published":"2022-12-15T23:15:10.457Z","references":[{"type":"FIX","url":"https://github.com/alist-org/alist/issues/2449"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/alistgo/alist","events":[{"introduced":"0"},{"last_affected":"efe0e6af2282286b28413c2607fd0832c5eece10"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"3.4.0"}],"cpe":"cpe:2.3:a:alistgo:alist:3.4.0:*:*:*:*:*:*:*"}}],"versions":["v2.0.0","v2.0.0-beta","v2.0.0-beta2","v2.0.0-beta3","v2.0.0-beta4","v2.0.0-beta5","v2.0.0-beta6","v2.0.0-beta7","v2.0.1","v2.0.10","v2.0.2","v2.0.3","v2.0.4","v2.0.4-fix","v2.0.4-fix2","v2.0.5","v2.0.5-libc","v2.0.6","v2.0.7","v2.0.8","v2.0.9","v2.1.0","v2.1.1","v2.1.2","v2.1.3","v2.2.0","v2.3.0","v2.3.1","v2.3.2","v2.4.0","v2.4.1","v2.4.2","v2.4.3","v2.5.0","v2.5.1","v2.5.2","v2.6.0","v2.6.1","v3.0.0-beta.0","v3.0.0-beta.1","v3.0.0-beta.2","v3.0.0-rc.0","v3.0.0-rc.1","v3.0.1","v3.0.2","v3.0.3","v3.1.0","v3.2.0","v3.2.1","v3.3.0","v3.4.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-45969.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}