-
-
Notifications
You must be signed in to change notification settings - Fork 3.4k
Arbitrary File Download Vulnerability #687
Copy link
Copy link
Closed
Description
Description
In versions 0.8.0~0.9.4, unthenticated attackers can exploit the path parameter in the download_work_dir_file API to download arbitrary files from the server.
Environment
- Operating System :windows docker
- Affected Version : 0.8.0~0.9.4
PoC
- visit
http://<host>/download_work_dir_file?path=/etc/passwd
Observe that the brower initiates the download of the specified file.
Screenshots
Vulnerable Code Location:
/python/api/download_work_dir_file.py,
specifically at:
file_path = request.args.get("path", "")Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels