| शीर्षक | glowxq glowxq-oj 1.0.0 Server-Side Request Forgery |
|---|
| विवरण | glowxq-oj contains an unauthenticated Server-Side Request Forgery (SSRF) vulnerability in the test case upload functionality. The ProblemCaseController class has an endpoint annotated with @SaIgnore that accepts a user-controlled URL parameter and passes it directly to HttpUtils.download() via FileUtils.downloadFile(). |
|---|
| स्रोत | ⚠️ https://fx4tqqfvdw4.feishu.cn/docx/K0SjdZTPRo31LExSdlfcC3jwn1c?from=from_copylink |
|---|
| उपयोगकर्ता | xcxr (UID 86629) |
|---|
| सबमिशन | 03/03/2026 06:47 AM (2 महीनों पहले) |
|---|
| संयम | 15/03/2026 09:36 AM (12 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 351112 [glowxq glowxq-oj तक 6f7c723090472057252040fd2bbbdaa1b5ed2393 ProblemCaseController.java uploadTestcaseZipUrl अधिकार वृद्धि] |
|---|
| अंक | 19 |
|---|