提交 #798605: 666ghj MiroFish 0.1.2 Arbitrary SQLite Database Read信息

标题666ghj MiroFish 0.1.2 Arbitrary SQLite Database Read
描述The GET /api/simulation/<simulation_id>/posts and GET /api/simulation/<simulation_id>/comments endpoints in MiroFish v0.1.2 use the platform query parameter directly in SQLite database file path construction without any validation. The platform value is interpolated into the filename as f"{platform}_simulation.db". An attacker can inject ../ sequences into platform to open and query any SQLite database ending with _simulation.db from any directory on the server.
来源⚠️ https://github.com/666ghj/MiroFish/issues/489
用户
 York Shen (UID 97025)
提交2026-04-07 10時00分 (21 日前)
管理2026-04-26 03時08分 (19 days later)
状态已接受
VulDB条目359632 [666ghj MiroFish 直到 0.1.2 Query Parameter simulation.py get_simulation_posts 平台 目录遍历]
积分20

Do you need the next level of professionalism?

Upgrade your account now!