Skip to content

Security Vulnerability - Arbitrary File Deletion via HTTP GET /tcdrop/deleteCachedFile #234

@tankeehock

Description

@tankeehock

Heyyy! The endpoint "/tcdrop/deleteCachedFile" is vulnerable to arbitrary file deletion attacks. There deletion relies on a user supplied input via the "file" parameter. There is no validation of the input and if a user supplies a payload like this file=../../../../../../../../../../../tmp/abc4.txt, it can technically delete any file given whatever access right it has.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions