Skip to main content

CVE-2022-36081: CWE-23: Relative Path Traversal in Linbreux wikmd

Medium
Published: Wed Sep 07 2022 (09/07/2022, 21:00:13 UTC)
Source: CVE
Vendor/Project: Linbreux
Product: wikmd

Description

Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, Wikmd is vulnerable to path traversal when accessing `/list/<path:folderpath>` and discloses lists of files located on the server including sensitive data. Version 1.7.1 fixes this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 22:20:32 UTC

Technical Analysis

CVE-2022-36081 is a path traversal vulnerability identified in the Linbreux wikmd product, a file-based wiki system that uses markdown files for content management. The vulnerability affects versions prior to 1.7.1 and arises from improper validation of user-supplied input in the `/list/<path:folderpath>` endpoint. Specifically, the application fails to properly restrict pathname inputs, allowing an attacker to manipulate the folder path parameter to traverse directories outside the intended scope. This can lead to unauthorized disclosure of file lists on the server, potentially exposing sensitive data stored within the filesystem. The underlying weakness is categorized under CWE-23 (Relative Path Traversal) and CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). Although no known exploits have been reported in the wild, the vulnerability poses a risk of information leakage that could facilitate further attacks. The issue was addressed in version 1.7.1 of wikmd by implementing proper input validation and path restriction mechanisms to prevent directory traversal. Since wikmd is a file-based wiki, the exposure of directory contents could reveal configuration files, user data, or other sensitive documents depending on the deployment context. The vulnerability does not require authentication or user interaction beyond sending crafted requests to the vulnerable endpoint, making it relatively easy to exploit if the service is publicly accessible.

Potential Impact

For European organizations using wikmd versions prior to 1.7.1, this vulnerability could lead to unauthorized disclosure of sensitive internal files and directory structures. This information leakage can compromise confidentiality by revealing configuration files, credentials, or proprietary documentation stored on the server. Such exposure may facilitate subsequent targeted attacks, including privilege escalation or lateral movement within the network. The integrity of data is not directly impacted by this vulnerability, as it primarily allows read-only access to file listings rather than modification. Availability is also not directly affected. However, the breach of confidentiality can have significant reputational and compliance consequences, especially under the GDPR framework, which mandates protection of personal and sensitive data. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on wikmd for documentation or knowledge management may be particularly at risk. The ease of exploitation without authentication increases the threat level if the vulnerable service is accessible from the internet or untrusted networks.

Mitigation Recommendations

Upgrade all instances of wikmd to version 1.7.1 or later, where the vulnerability has been fixed with proper input validation and path restriction. If immediate upgrade is not feasible, implement network-level access controls such as firewall rules or VPN requirements to restrict access to the wikmd service to trusted internal users only. Deploy web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the `/list/` endpoint by filtering suspicious path characters like '../'. Conduct an audit of all wikmd deployments within the organization to identify and remediate vulnerable versions. Review and minimize the sensitive data stored in directories accessible by wikmd to reduce potential exposure. Implement logging and monitoring of access to the `/list/` endpoint to detect abnormal or unauthorized access patterns indicative of exploitation attempts. Educate development and operations teams on secure coding practices related to input validation and directory traversal prevention for future deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3d9e

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/22/2025, 10:20:32 PM

Last updated: 8/4/2025, 7:07:56 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats