| शीर्षक | 666ghj MiroFish 0.1.2 Arbitrary SQLite Database Read |
|---|
| विवरण | The GET /api/simulation/<simulation_id>/posts and GET /api/simulation/<simulation_id>/comments endpoints in MiroFish v0.1.2 use the platform query parameter directly in SQLite database file path construction without any validation. The platform value is interpolated into the filename as f"{platform}_simulation.db". An attacker can inject ../ sequences into platform to open and query any SQLite database ending with _simulation.db from any directory on the server. |
|---|
| स्रोत | ⚠️ https://github.com/666ghj/MiroFish/issues/489 |
|---|
| उपयोगकर्ता | York Shen (UID 97025) |
|---|
| सबमिशन | 07/04/2026 10:00 AM (21 दिन पहले) |
|---|
| संयम | 26/04/2026 03:08 AM (19 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 359632 [666ghj MiroFish तक 0.1.2 Query Parameter simulation.py get_simulation_posts मंच निर्देशिका ट्रैवर्सल] |
|---|
| अंक | 20 |
|---|