제출 #780666: Sanster IOPaint 1.5.3 Path Traversal - Arbitrary File Read정보

제목Sanster IOPaint 1.5.3 Path Traversal - Arbitrary File Read
설명The File Manager component in IOPaint contains a path traversal vulnerability in the _get_file() method. The filename parameter received from user HTTP query strings is directly concatenated with a base directory path using Python's Path / operator without any sanitization or validation. This allows an attacker to use ../ sequences to escape the intended directory and read arbitrary files on the server.
원천⚠️ https://github.com/August829/CVEP/issues/11
사용자
 Yu_Bao (UID 89348)
제출2026. 03. 16. AM 06:56 (20 날 ago)
모더레이션2026. 03. 31. PM 06:20 (15 days later)
상태수락
VulDB 항목354448 [Sanster IOPaint 1.5.3 File Manager file_manager.py _get_file filename 디렉토리 순회]
포인트들20

Do you need the next level of professionalism?

Upgrade your account now!