In Tipask < 3.5.9, path parameters entered by the user are not validated when downloading attachments, a registered user can download arbitrary files on the Tipask server such as .env, /etc/passwd, laravel.log, causing infomation leakage.
References
Link | Resource |
---|---|
https://github.com/sdfsky/tipask/blob/c4e6aa9f6017c9664780570016954c0922d203b7/app/Http/Controllers/AttachController.php#L42 | Exploit Third Party Advisory |
https://github.com/sdfsky/tipask/commit/9b5f13d1708e9a5dc0959cb8a97be1c32b94ca69 | Patch Third Party Advisory |
https://www.yuque.com/henry-weply/penetration/fza5hm | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-05-23 16:16
Updated : 2022-06-03 14:15
NVD link : CVE-2021-41714
Mitre link : CVE-2021-41714
CVE.ORG link : CVE-2021-41714
JSON object : View
Products Affected
tipask
- tipask
CWE
CWE-494
Download of Code Without Integrity Check