Oceanic allows unsanitized user input to lead to path traversal in URLs
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          May 14, 2024 
          in
          
            OceanicJS/Oceanic
          
          •
          Updated May 14, 2024 
      
  
Description
        Published by the National Vulnerability Database
      May 14, 2024 
    
  
        Published to the GitHub Advisory Database
      May 14, 2024 
    
  
        Reviewed
      May 14, 2024 
    
  
        Last updated
      May 14, 2024 
    
  
Impact
Input to functions such as
Client.rest.channels.removeBanis not url-encoded, resulting in specially crafted input such as../../../channels/{id}being normalized into the url/api/v10/channels/{id}, and deleting a channel rather than removing a ban.Workarounds
encodeURIComponentbefore providing it to the library.References
OceanicJS/Oceanic@8bf8ee8
References