In Tipask < 3.5.9, path parameters entered by the user are not validated when downloading attachments, a registered user can download arbitrary files on the Tipask server such as .env, /etc/passwd, laravel.log, causing infomation leakage.
References
Link | Resource |
---|---|
https://github.com/sdfsky/tipask/commit/9b5f13d1708e9a5dc0959cb8a97be1c32b94ca69 | Patch Third Party Advisory |
https://github.com/sdfsky/tipask/blob/c4e6aa9f6017c9664780570016954c0922d203b7/app/Http/Controllers/AttachController.php#L42 | Exploit Third Party Advisory |
https://www.yuque.com/henry-weply/penetration/fza5hm | Third Party Advisory |
Configurations
Information
Published : 2022-05-23 09:16
Updated : 2022-06-03 07:15
NVD link : CVE-2021-41714
Mitre link : CVE-2021-41714
JSON object : View
CWE
CWE-494
Download of Code Without Integrity Check
Products Affected
tipask
- tipask