While working on dtm project, I reviewed the dependency manifest and found that it uses a vulnerable version of github.com/dapr/dapr. During analysis, I discovered that inconsistencies in path normalization between the ACL layer and the request dispatch logic can be exploited using encoded path traversal sequences. This allows attackers to bypass access control policies by crafting method paths (e.g., using encoded ../ sequences), potentially gaining unauthorized access to restricted service methods.
CVE Report
CVE Link
While working on dtm project, I reviewed the dependency manifest and found that it uses a vulnerable version of
github.com/dapr/dapr. During analysis, I discovered that inconsistencies in path normalization between the ACL layer and the request dispatch logic can be exploited using encoded path traversal sequences. This allows attackers to bypass access control policies by crafting method paths (e.g., using encoded../sequences), potentially gaining unauthorized access to restricted service methods.CVE Report
CVE Link