| Título | MigoXLab LMeterX v1.2.0 Path Traversal |
|---|
| Descrição | # Directory Traversal via task_id Leading to Arbitrary File Overwrite
## Vulnerability Details
- Affected Endpoint `POST /api/upload`
- https://github.com/MigoXLab/LMeterX/blob/main/backend/service/upload_service.py#L100
- https://github.com/MigoXLab/LMeterX/blob/main/backend/service/upload_service.py#L160
A directory traversal vulnerability exists in the file upload functionality, where the `task_id` parameter is used to determine the storage path. By supplying crafted values such as `../`, an attacker can escape the intended `upload_files` directory and write files to arbitrary locations on the server.
## PoC
```bash
curl -X POST "http://localhost:5001/api/upload?task_id=../zznq" \
-F "file=@./pocs/zznq.crt"
```
<img width="2020" height="70" alt="Image" src="https://github.com/user-attachments/assets/db99dcc8-368c-492e-8b40-fbb100a69309" /> |
|---|
| Fonte | ⚠️ https://github.com/MigoXLab/LMeterX/issues/10 |
|---|
| Utilizador | zznQ (UID 64000) |
|---|
| Submissão | 24/07/2025 06h37 (há 9 meses) |
|---|
| Moderação | 08/08/2025 09h35 (15 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 319225 [MigoXLab LMeterX 1.2.0 upload_service.py process_cert_files task_id Travessia de Diretório] |
|---|
| Pontos | 20 |
|---|