| عنوان | 666ghj MiroFish 0.1.2 Arbitrary SQLite Database Read |
|---|
| الوصف | The GET /api/simulation/<simulation_id>/posts and GET /api/simulation/<simulation_id>/comments endpoints in MiroFish v0.1.2 use the platform query parameter directly in SQLite database file path construction without any validation. The platform value is interpolated into the filename as f"{platform}_simulation.db". An attacker can inject ../ sequences into platform to open and query any SQLite database ending with _simulation.db from any directory on the server. |
|---|
| المصدر | ⚠️ https://github.com/666ghj/MiroFish/issues/489 |
|---|
| المستخدم | York Shen (UID 97025) |
|---|
| ارسال | 07/04/2026 10:00 AM (21 أيام منذ) |
|---|
| الاعتدال | 26/04/2026 03:08 AM (19 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 359632 [666ghj MiroFish حتى 0.1.2 Query Parameter simulation.py get_simulation_posts المنصة اجتياز الدليل] |
|---|
| النقاط | 20 |
|---|