| Título | glowxq glowxq-oj 1.0.0 Server-Side Request Forgery |
|---|
| Descripción | glowxq-oj contains an unauthenticated Server-Side Request Forgery (SSRF) vulnerability in the test case upload functionality. The ProblemCaseController class has an endpoint annotated with @SaIgnore that accepts a user-controlled URL parameter and passes it directly to HttpUtils.download() via FileUtils.downloadFile(). |
|---|
| Fuente | ⚠️ https://fx4tqqfvdw4.feishu.cn/docx/K0SjdZTPRo31LExSdlfcC3jwn1c?from=from_copylink |
|---|
| Usuario | xcxr (UID 86629) |
|---|
| Sumisión | 2026-03-03 06:47 (hace 2 meses) |
|---|
| Moderación | 2026-03-15 09:36 (12 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 351112 [glowxq glowxq-oj hasta 6f7c723090472057252040fd2bbbdaa1b5ed2393 ProblemCaseController.java uploadTestcaseZipUrl escalada de privilegios] |
|---|
| Puntos | 19 |
|---|