| Title | Upsonic <=v0.55.6 Path Traversal: '..\filedir' |
|---|
| Description | Attackers can exploit a directory traversal vulnerability by manipulating the filename parameter in the file upload function to create arbitrary files on the target host. The vulnerability originates from line 39 in markdown/server.py, where the code file_path = os.path.join(temp_dir, file.filename) does not sanitize the file.filename.
|
|---|
| Source | ⚠️ https://github.com/Upsonic/Upsonic/issues/356 |
|---|
| User | Anonymous User |
|---|
| Submission | 06/09/2025 10:42 (10 months ago) |
|---|
| Moderation | 06/19/2025 08:53 (10 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 313282 [Upsonic up to 0.55.6 markdown/server.py os.path.join file.filename path traversal] |
|---|
| Points | 19 |
|---|