CVE-2019-14322
Description
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Werkzeug before 0.15.5 allowed path traversal on Windows via drive names in SharedDataMiddleware, enabling arbitrary file access.
Vulnerability
Overview
The vulnerability resides in Werkzeug's SharedDataMiddleware component, which serves static files. On Windows, the middleware improperly handles path segments that include drive letters (e.g., C:). Due to the behavior of Python's os.path.join() on Windows, a segment containing a drive name resets the combined path to that drive, bypassing intended directory restrictions [4].
Exploitation
Prerequisites
An attacker must be able to craft HTTP requests targeting a Windows-based application using Werkzeug's SharedDataMiddleware to serve static files. No authentication is required; the attack leverages specially constructed URL paths containing drive letters (e.g., C:) to escape the document root [1][4].
Impact
Successful exploitation allows an unauthenticated remote attacker to read arbitrary files on the Windows filesystem that the application process has access to. The flaw was previously addressed in safe_join() in Werkzeug 0.12.2, but SharedDataMiddleware used a separate, unprotected implementation [4].
Mitigation
Status
The issue is fixed in Werkzeug version 0.15.5, released on 2019-07-17. The fix aligns SharedDataMiddleware to use safe_join(). All users running Werkzeug on Windows with versions prior to 0.15.5 should update immediately [4].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
werkzeugPyPI | < 0.15.5 | 0.15.5 |
Affected products
2- Pallets/Werkzeugdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-j544-7q9p-6xp8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-14322ghsaADVISORY
- packetstormsecurity.com/files/163398/Pallets-Werkzeug-0.15.4-Path-Traversal.htmlghsax_refsource_MISCWEB
- palletsprojects.com/blog/werkzeug-0-15-5-releasedghsaWEB
- palletsprojects.com/blog/werkzeug-0-15-5-released/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.