{"api_version":"1","generated_at":"2026-04-23T13:18:35+00:00","cve":"CVE-2021-35397","urls":{"html":"https://cve.report/CVE-2021-35397","api":"https://cve.report/api/cve/CVE-2021-35397.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-35397","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-35397"},"summary":{"title":"CVE-2021-35397","description":"A path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending crafted HTTP request with specific path to read. Successful exploitation could allow the attacker to read files that should be restricted.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-08-04 11:15:00","updated_at":"2021-08-11 23:33:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://github.com/an-tao/drogon","name":"https://github.com/an-tao/drogon","refsource":"MISC","tags":[],"title":"GitHub - drogonframework/drogon: Drogon: A C++14/17 based HTTP web application framework running on Linux/macOS/Unix/Windows","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/an-tao/drogon/wiki/ENG-03-Quick-Start#Static-Site","name":"https://github.com/an-tao/drogon/wiki/ENG-03-Quick-Start#Static-Site","refsource":"MISC","tags":[],"title":"ENG 03 Quick Start · drogonframework/drogon Wiki · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/an-tao/drogon/wiki/ENG-02-Installation","name":"https://github.com/an-tao/drogon/wiki/ENG-02-Installation","refsource":"MISC","tags":[],"title":"ENG 02 Installation · drogonframework/drogon Wiki · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/an-tao/drogon/blob/834e3eabdd0441ad2bc80c02e8bbfc3b8312c213/lib/src/StaticFileRouter.cc#L62-L67","name":"https://github.com/an-tao/drogon/blob/834e3eabdd0441ad2bc80c02e8bbfc3b8312c213/lib/src/StaticFileRouter.cc#L62-L67","refsource":"MISC","tags":[],"title":"drogon/StaticFileRouter.cc at 834e3eabdd0441ad2bc80c02e8bbfc3b8312c213 · drogonframework/drogon · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-35397","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-35397","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"35397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drogon","cpe5":"drogon","cpe6":"1.0.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drogon","cpe5":"drogon","cpe6":"1.0.0","cpe7":"beta14","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drogon","cpe5":"drogon","cpe6":"1.0.0","cpe7":"beta15","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drogon","cpe5":"drogon","cpe6":"1.0.0","cpe7":"beta16","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drogon","cpe5":"drogon","cpe6":"1.0.0","cpe7":"beta17","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drogon","cpe5":"drogon","cpe6":"1.0.0","cpe7":"beta18","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drogon","cpe5":"drogon","cpe6":"1.0.0","cpe7":"beta19","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drogon","cpe5":"drogon","cpe6":"1.0.0","cpe7":"beta20","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drogon","cpe5":"drogon","cpe6":"1.0.0","cpe7":"beta21","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35397","vulnerable":"1","versionEndIncluding":"1.6.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drogon","cpe5":"drogon","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-35397","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending crafted HTTP request with specific path to read. Successful exploitation could allow the attacker to read files that should be restricted."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://github.com/an-tao/drogon","refsource":"MISC","name":"https://github.com/an-tao/drogon"},{"url":"https://github.com/an-tao/drogon/blob/834e3eabdd0441ad2bc80c02e8bbfc3b8312c213/lib/src/StaticFileRouter.cc#L62-L67","refsource":"MISC","name":"https://github.com/an-tao/drogon/blob/834e3eabdd0441ad2bc80c02e8bbfc3b8312c213/lib/src/StaticFileRouter.cc#L62-L67"},{"url":"https://github.com/an-tao/drogon/wiki/ENG-02-Installation","refsource":"MISC","name":"https://github.com/an-tao/drogon/wiki/ENG-02-Installation"},{"url":"https://github.com/an-tao/drogon/wiki/ENG-03-Quick-Start#Static-Site","refsource":"MISC","name":"https://github.com/an-tao/drogon/wiki/ENG-03-Quick-Start#Static-Site"}]}},"nvd":{"publishedDate":"2021-08-04 11:15:00","lastModifiedDate":"2021-08-11 23:33:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drogon:drogon:1.0.0:beta14:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drogon:drogon:1.0.0:beta21:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drogon:drogon:1.0.0:beta20:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drogon:drogon:1.0.0:beta19:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drogon:drogon:1.0.0:beta18:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drogon:drogon:1.0.0:beta17:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drogon:drogon:1.0.0:beta16:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drogon:drogon:1.0.0:beta15:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drogon:drogon:*:*:*:*:*:*:*:*","versionStartIncluding":"1.1.0","versionEndIncluding":"1.6.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:drogon:drogon:1.0.0:-:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"35397","Ordinal":"210889","Title":"CVE-2021-35397","CVE":"CVE-2021-35397","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"35397","Ordinal":"1","NoteData":"A path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending crafted HTTP request with specific path to read. Successful exploitation could allow the attacker to read files that should be restricted.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"35397","Ordinal":"2","NoteData":"2021-08-04","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"35397","Ordinal":"3","NoteData":"2021-08-04","Type":"Other","Title":"Modified"}]}}}