| Title | glowxq glowxq-oj 1.0.0 Server-Side Request Forgery |
|---|
| Description | glowxq-oj contains an unauthenticated Server-Side Request Forgery (SSRF) vulnerability in the test case upload functionality. The ProblemCaseController class has an endpoint annotated with @SaIgnore that accepts a user-controlled URL parameter and passes it directly to HttpUtils.download() via FileUtils.downloadFile(). |
|---|
| Source | ⚠️ https://fx4tqqfvdw4.feishu.cn/docx/K0SjdZTPRo31LExSdlfcC3jwn1c?from=from_copylink |
|---|
| User | xcxr (UID 86629) |
|---|
| Submission | 03/03/2026 06:47 (2 months ago) |
|---|
| Moderation | 03/15/2026 09:36 (12 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 351112 [glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393 ProblemCaseController.java uploadTestcaseZipUrl server-side request forgery] |
|---|
| Points | 19 |
|---|