提出 #782200: FedML-AI FedML <=0.8.9 Path Traversal情報

タイトルFedML-AI FedML <=0.8.9 Path Traversal
説明A path traversal vulnerability (CWE-22) exists in the Android client of FedML. The client processes MQTT messages as task instructions and uses the dataSet parameter to construct filesystem paths without validation. An attacker who can publish or tamper with MQTT messages can supply crafted path traversal payloads (e.g., ../../../../) to cause the client to access and enumerate arbitrary directories within the app’s accessible filesystem.
ソース⚠️ https://github.com/AnalogyC0de/public_exp/issues/25
ユーザー
 Ana10gy (UID 93358)
送信2026年03月18日 09:40 (29 日 ago)
モデレーション2026年04月04日 08:40 (17 days later)
ステータス承諾済み
VulDBエントリ355288 [FedML-AI FedML 迄 0.8.9 MQTT Message FileUtils.java dataSet ディレクトリトラバーサル]
ポイント20

Do you want to use VulDB in your project?

Use the official API to access entries easily!