github.com/filebrowser/filebrowser/v2 is vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere
15
Low Risk
Affected versions of this package expose the root directory path in the browser window title, allowing attackers to infer sensitive server structures. By observing customized directory names, such as /JohnDoeHome (in the window title), unauthenticated or low-privileged users can map user accounts, internal naming conventions, or project hierarchies. This type of information facilitates targeted attacks such as path traversal exploits by revealing restricted directory names.
You are affected if you are using a version that falls within the vulnerable range.
github.com/filebrowser/filebrowser/v2 is vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere in versions 2.0.0 - 2.33.10.
Upgrade the github.com/filebrowser/filebrowser/v2 library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant