actix-files has a possible exposure of information vulnerability
基本資訊
- GHSA ID: GHSA-8v2v-wjwg-vx6r
- CVE ID: None
- 嚴重性: MEDIUM
- 發布時間: 2026-02-06T18:56:20Z
- 來源: GitHub Advisory
漏洞描述
Summary
When passing a non-existing folder to the actix_files::Files::new() method causes the actix server to expose unexpected files.
Details
The actix-files library exposes a Files struct that configures an actix service to serve the files in a folder as static assets. Below you can find the signature of the Files::new method:
pub fn new<T: Into<PathBuf>>(mount_path: &str, serve_from: T) -> Files
When the mount_path you pass to Files doesn’t exist, it defaults to an empty path (Path::new()). When the service receives a HTTP request, it joins the request information with the empty path and calls canonicalize. Rust resolves this path as relative and returns any file that matches it.
This behavior causes the library to expose unexpected files when the folder is not present.
PoC
There is a working PoC on https://github.com/Angelmmiguel/actix-files-vuln, although the next steps can be followed to reproduce the issue
- Clone the https://github.com/actix/examples repository.
- Change your directory to the
basics/static-filesfolder. -
Edit the
src/main.rsfile and change the line 13 to mount a non-existing folder:- .service(Files::new("/images", "static/images/").show_files_listing()) + .service(Files::new("/images", "static/missing/").show_files_listing()) - Run the project with
cargo run. - Access the http://localhost:8080/images/Cargo.toml URL.
Impact
This is an exposure of information vulnerability. It affects anyone using the actix-files::Files library that mounts a non-existing folder for any reason.
影響範圍
- rust:actix-files (<= 0.6.9) → 0.6.10
CVSS 評分
- CVSS v4: 6.3 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)
CWE 分類
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
EPSS 評分
- EPSS: N/A
萃取備註
- 資料來源: GitHub Security Advisories Database
- 信心水準: 高(官方漏洞資料庫)
- 處理時間: 2026-02-08T07:48:04.845477