In Tipask < 3.5.9, path parameters entered by the user are not validated when downloading attachments, a registered user can download arbitrary files on the Tipask server such as .env, /etc/passwd, laravel.log, causing infomation leakage.
References
Link | Resource |
---|---|
https://github.com/sdfsky/tipask/blob/c4e6aa9f6017c9664780570016954c0922d203b7/app/Http/Controllers/AttachController.php#L42 | Exploit Third Party Advisory |
https://github.com/sdfsky/tipask/commit/9b5f13d1708e9a5dc0959cb8a97be1c32b94ca69 | Patch Third Party Advisory |
https://www.yuque.com/henry-weply/penetration/fza5hm | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-05-23T15:34:34
Updated: 2022-05-23T15:34:34
Reserved: 2021-09-27T00:00:00
Link: CVE-2021-41714
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-23T16:16:06.313
Modified: 2022-06-03T14:15:01.887
Link: CVE-2021-41714
JSON object: View
Redhat Information
No data.
CWE