Security: Path Traversal in /preview und /detect-angle #1
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Problem\n\nDer
path-Parameter in/preview(server.py:207) und/detect-angle(server.py:469) wird nicht gegen das Temp-Verzeichnis geprüft.\n\nJeder authentifizierte Nutzer kann beliebige Bilddateien vom Dateisystem lesen, z.B.:\n\nGET /preview?path=/home/vchuser/geheimnis.jpg\n\n\n## Fix\n\nPfad-Validierung analog zur vorhandenen Logik in/download:\npython\nif not os.path.abspath(path).startswith(tempfile.gettempdir()):\n raise HTTPException(status_code=403)\nFixed in commit
be0a790.