| Title | 666ghj MiroFish 0.1.2 Arbitrary SQLite Database Read |
|---|
| Description | The GET /api/simulation/<simulation_id>/posts and GET /api/simulation/<simulation_id>/comments endpoints in MiroFish v0.1.2 use the platform query parameter directly in SQLite database file path construction without any validation. The platform value is interpolated into the filename as f"{platform}_simulation.db". An attacker can inject ../ sequences into platform to open and query any SQLite database ending with _simulation.db from any directory on the server. |
|---|
| Source | ⚠️ https://github.com/666ghj/MiroFish/issues/489 |
|---|
| User | York Shen (UID 97025) |
|---|
| Submission | 04/07/2026 10:00 (21 days ago) |
|---|
| Moderation | 04/26/2026 03:08 (19 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 359632 [666ghj MiroFish up to 0.1.2 Query Parameter simulation.py get_simulation_posts Platform path traversal] |
|---|
| Points | 20 |
|---|