إرسال #799584: HBAI-Ltd Toonflow 1.1.1 Path Traversal Leading to Arbitrary File Readالمعلومات

عنوانHBAI-Ltd Toonflow 1.1.1 Path Traversal Leading to Arbitrary File Read
الوصفA three-step attack chain allows any authenticated user to read arbitrary files from the server via the storyboard export feature: Inject malicious filePath into the o_storyboard database table via updateStoryboardUrl — the replaceUrl() function fails to sanitize non-URL strings, returning path traversal payloads unchanged Trigger file read via exportImage — the endpoint uses path.join(getPath("oss"), item.filePath!) without isPathInside() validation, allowing the crafted filePath to escape the OSS directory Exfiltrate file contents — the file is included in the downloaded ZIP archive
المصدر⚠️ https://github.com/HBAI-Ltd/Toonflow-app/issues/97
المستخدم
 Yu-Bao (UID 96702)
ارسال08/04/2026 11:07 AM (19 أيام منذ)
الاعتدال26/04/2026 10:16 AM (18 days later)
الحالةتمت الموافقة
إدخال VulDB359661 [HBAI-Ltd Toonflow-app حتى 1.1.1 Storyboard Export replaceUrl.ts updateStoryboardUrl url اجتياز الدليل]
النقاط20

Do you need the next level of professionalism?

Upgrade your account now!