Enviar #602369: gooaclok819 sublinkX 1.8 Arbitrary File Writeinformación

Títulogooaclok819 sublinkX 1.8 Arbitrary File Write
DescripciónThis endpoint allows users to write arbitrary files under the ./template/ directory. Due to the lack of input sanitization, it is vulnerable to directory traversal, enabling attackers to write files outside the intended directory structure. Details can be found in https://github.com/gooaclok819/sublinkX/issues/69.
Fuente⚠️ https://github.com/gooaclok819/sublinkX/issues/69
Usuario
 Tritium (UID 50779)
Sumisión2025-06-22 16:23 (hace 10 meses)
Moderación2025-06-27 12:56 (5 days later)
EstadoAceptado
Entrada de VulDB314090 [gooaclok819 sublinkX hasta 1.8 api/template.go AddTemp filename recorrido de directorios]
Puntos18

Want to know what is going to be exploited?

We predict KEV entries!