Submit #799583: HBAI-Ltd Toonflow 1.1.1 Remote Code Executioninfo

TitelHBAI-Ltd Toonflow 1.1.1 Remote Code Execution
BeschreibungThe Toonflow application's update mechanism (/api/setting/about/downloadApp) downloads a ZIP file from a user-controlled URL without any integrity verification (no signature, no checksum, no domain allowlist). The ZIP is extracted without path traversal validation, and its contents are then copied directly over the application's own server code (data/serve/), web frontend (data/web/), prompt templates (data/skills/), and ML models (data/models/). An authenticated attacker can supply a URL pointing to a malicious ZIP file to achieve complete remote code execution by replacing the application's server-side JavaScript.
Quelle⚠️ https://github.com/HBAI-Ltd/Toonflow-app/issues/96
Benutzer
 Yu Bao (UID 88956)
Einreichung08.04.2026 11:03 (vor 19 Tagen)
Moderieren26.04.2026 10:16 (18 days later)
StatusAkzeptiert
VulDB Eintrag359660 [HBAI-Ltd Toonflow-app bis 1.1.1 downloadApp Endpoint downloadApp.ts z.url Directory Traversal]
Punkte20

Do you want to use VulDB in your project?

Use the official API to access entries easily!