4.6
CVSSv2

CVE-2021-23357

Published: 15/03/2021 Updated: 18/03/2021
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.3 | Impact Score: 3.4 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

All versions of package github.com/tyktechnologies/tyk/gateway are vulnerable to Directory Traversal via the handleAddOrUpdateApi function. This function is able to delete arbitrary JSON files on the disk where Tyk is running via the management API. The APIID is provided by the user and this value is then used to create a file on disk. If there is a file found with the same name then it will be deleted and then re-created with the contents of the API creation request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tyk tyk

Github Repositories

CVEcrystalyer CVE tool to help with getting CVE details needed for reporting Tool uses reitre-jshtml as input, it will parse all of the CVE-s and grab the details from NVD and print them in terminal for copy/paste /CVEcrystalyer -h -c NAME Single CVE | Multiple CVE-s separated with ',' -> -c CVE-XXX-XXXX,CV