提交 #602369: gooaclok819 sublinkX 1.8 Arbitrary File Write信息

标题gooaclok819 sublinkX 1.8 Arbitrary File Write
描述This endpoint allows users to write arbitrary files under the ./template/ directory. Due to the lack of input sanitization, it is vulnerable to directory traversal, enabling attackers to write files outside the intended directory structure. Details can be found in https://github.com/gooaclok819/sublinkX/issues/69.
来源⚠️ https://github.com/gooaclok819/sublinkX/issues/69
用户
 Tritium (UID 50779)
提交2025-06-22 16時23分 (10 月前)
管理2025-06-27 12時56分 (5 days later)
状态已接受
VulDB条目314090 [gooaclok819 sublinkX 直到 1.8 api/template.go AddTemp filename 目录遍历]
积分18

Do you want to use VulDB in your project?

Use the official API to access entries easily!