| Titel | glowxq glowxq-oj 1.0.0 Server-Side Request Forgery |
|---|
| Beschreibung | glowxq-oj contains an unauthenticated Server-Side Request Forgery (SSRF) vulnerability in the test case upload functionality. The ProblemCaseController class has an endpoint annotated with @SaIgnore that accepts a user-controlled URL parameter and passes it directly to HttpUtils.download() via FileUtils.downloadFile(). |
|---|
| Quelle | ⚠️ https://fx4tqqfvdw4.feishu.cn/docx/K0SjdZTPRo31LExSdlfcC3jwn1c?from=from_copylink |
|---|
| Benutzer | xcxr (UID 86629) |
|---|
| Einreichung | 03.03.2026 06:47 (vor 2 Monaten) |
|---|
| Moderieren | 15.03.2026 09:36 (12 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 351112 [glowxq glowxq-oj bis 6f7c723090472057252040fd2bbbdaa1b5ed2393 ProblemCaseController.java uploadTestcaseZipUrl erweiterte Rechte] |
|---|
| Punkte | 19 |
|---|