| Titel | Upsonic <=v0.55.6 Path Traversal: '..\filedir' |
|---|
| Beschreibung | Attackers can exploit a directory traversal vulnerability by manipulating the filename parameter in the file upload function to create arbitrary files on the target host. The vulnerability originates from line 39 in markdown/server.py, where the code file_path = os.path.join(temp_dir, file.filename) does not sanitize the file.filename.
|
|---|
| Quelle | ⚠️ https://github.com/Upsonic/Upsonic/issues/356 |
|---|
| Benutzer | Anonymous User |
|---|
| Einreichung | 09.06.2025 10:42 (vor 10 Monaten) |
|---|
| Moderieren | 19.06.2025 08:53 (10 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 313282 [Upsonic bis 0.55.6 markdown/server.py os.path.join file.filename Directory Traversal] |
|---|
| Punkte | 19 |
|---|