Skip to content

Arbitrary File Download Vulnerability #687

@vityuasd

Description

@vityuasd

Description

In versions 0.8.0~0.9.4, unthenticated attackers can exploit the path parameter in the download_work_dir_file API to download arbitrary files from the server.

Environment

  • Operating System :windows docker
  • Affected Version : 0.8.0~0.9.4

PoC

  1. visit http://<host>/download_work_dir_file?path=/etc/passwd

Observe that the brower initiates the download of the specified file.

Screenshots

Image

Vulnerable Code Location:

/python/api/download_work_dir_file.py,
specifically at:

file_path = request.args.get("path", "")

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions