Published: 02/04/2021 Updated: 08/04/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal in RStudio Shiny Server prior to 1.5.16 allows malicious users to read the application source code, involving an encoded slash.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rstudio shiny server

Github Repositories

Rstudio Shiny-Server Directory Traversal and Source Code Leak CVE-2021-3374 Rstudio Shiny-Server prior to 1516 is vulnerable to directory traversal and source code leakage This can be exploited by appending an encoded slash to the URL Direct Proxied References Security notice from Rstudio webarchiveorg/web/20210113222412/blogrstudiocom/2021/01/13/shi