Submit #798605: 666ghj MiroFish 0.1.2 Arbitrary SQLite Database Readinfo

Title666ghj MiroFish 0.1.2 Arbitrary SQLite Database Read
DescriptionThe GET /api/simulation/<simulation_id>/posts and GET /api/simulation/<simulation_id>/comments endpoints in MiroFish v0.1.2 use the platform query parameter directly in SQLite database file path construction without any validation. The platform value is interpolated into the filename as f"{platform}_simulation.db". An attacker can inject ../ sequences into platform to open and query any SQLite database ending with _simulation.db from any directory on the server.
Source⚠️ https://github.com/666ghj/MiroFish/issues/489
User
 York Shen (UID 97025)
Submission04/07/2026 10:00 (21 days ago)
Moderation04/26/2026 03:08 (19 days later)
StatusAccepted
VulDB entry359632 [666ghj MiroFish up to 0.1.2 Query Parameter simulation.py get_simulation_posts Platform path traversal]
Points20