Отправить #799583: HBAI-Ltd Toonflow 1.1.1 Remote Code ExecutionИнформация

НазваниеHBAI-Ltd Toonflow 1.1.1 Remote Code Execution
ОписаниеThe Toonflow application's update mechanism (/api/setting/about/downloadApp) downloads a ZIP file from a user-controlled URL without any integrity verification (no signature, no checksum, no domain allowlist). The ZIP is extracted without path traversal validation, and its contents are then copied directly over the application's own server code (data/serve/), web frontend (data/web/), prompt templates (data/skills/), and ML models (data/models/). An authenticated attacker can supply a URL pointing to a malicious ZIP file to achieve complete remote code execution by replacing the application's server-side JavaScript.
Источник⚠️ https://github.com/HBAI-Ltd/Toonflow-app/issues/96
Пользователь
 Yu Bao (UID 88956)
Представление08.04.2026 11:03 (20 дни назад)
Модерация26.04.2026 10:16 (18 days later)
Статуспринято
Запись VulDB359660 [HBAI-Ltd Toonflow-app до 1.1.1 downloadApp Endpoint downloadApp.ts z.url обход каталога]
Баллы20

Interested in the pricing of exploits?

See the underground prices here!