| Título | Upsonic <=v0.55.6 Path Traversal: '..\filedir' |
|---|
| Descripción | Attackers can exploit a directory traversal vulnerability by manipulating the filename parameter in the file upload function to create arbitrary files on the target host. The vulnerability originates from line 39 in markdown/server.py, where the code file_path = os.path.join(temp_dir, file.filename) does not sanitize the file.filename.
|
|---|
| Fuente | ⚠️ https://github.com/Upsonic/Upsonic/issues/356 |
|---|
| Usuario | Anonymous User |
|---|
| Sumisión | 2025-06-09 10:42 (hace 10 meses) |
|---|
| Moderación | 2025-06-19 08:53 (10 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 313282 [Upsonic hasta 0.55.6 markdown/server.py os.path.join file.filename recorrido de directorios] |
|---|
| Puntos | 19 |
|---|