إرسال #602369: gooaclok819 sublinkX 1.8 Arbitrary File Writeالمعلومات

عنوانgooaclok819 sublinkX 1.8 Arbitrary File Write
الوصفThis endpoint allows users to write arbitrary files under the ./template/ directory. Due to the lack of input sanitization, it is vulnerable to directory traversal, enabling attackers to write files outside the intended directory structure. Details can be found in https://github.com/gooaclok819/sublinkX/issues/69.
المصدر⚠️ https://github.com/gooaclok819/sublinkX/issues/69
المستخدم
 Tritium (UID 50779)
ارسال22/06/2025 04:23 PM (10 أشهر منذ)
الاعتدال27/06/2025 12:56 PM (5 days later)
الحالةتمت الموافقة
إدخال VulDB314090 [gooaclok819 sublinkX حتى 1.8 api/template.go AddTemp filename اجتياز الدليل]
النقاط18

Do you know our Splunk app?

Download it now for free!