إرسال #798605: 666ghj MiroFish 0.1.2 Arbitrary SQLite Database Readالمعلومات

عنوان666ghj MiroFish 0.1.2 Arbitrary SQLite Database Read
الوصفThe GET /api/simulation/<simulation_id>/posts and GET /api/simulation/<simulation_id>/comments endpoints in MiroFish v0.1.2 use the platform query parameter directly in SQLite database file path construction without any validation. The platform value is interpolated into the filename as f"{platform}_simulation.db". An attacker can inject ../ sequences into platform to open and query any SQLite database ending with _simulation.db from any directory on the server.
المصدر⚠️ https://github.com/666ghj/MiroFish/issues/489
المستخدم
 York Shen (UID 97025)
ارسال07/04/2026 10:00 AM (21 أيام منذ)
الاعتدال26/04/2026 03:08 AM (19 days later)
الحالةتمت الموافقة
إدخال VulDB359632 [666ghj MiroFish حتى 0.1.2 Query Parameter simulation.py get_simulation_posts المنصة اجتياز الدليل]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!