CVE-2021-41714

In Tipask < 3.5.9, path parameters entered by the user are not validated when downloading attachments, a registered user can download arbitrary files on the Tipask server such as .env, /etc/passwd, laravel.log, causing infomation leakage.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tipask:tipask:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:26

Type Values Removed Values Added
References () https://github.com/sdfsky/tipask/blob/c4e6aa9f6017c9664780570016954c0922d203b7/app/Http/Controllers/AttachController.php#L42 - Exploit, Third Party Advisory () https://github.com/sdfsky/tipask/blob/c4e6aa9f6017c9664780570016954c0922d203b7/app/Http/Controllers/AttachController.php#L42 - Exploit, Third Party Advisory
References () https://github.com/sdfsky/tipask/commit/9b5f13d1708e9a5dc0959cb8a97be1c32b94ca69 - Patch, Third Party Advisory () https://github.com/sdfsky/tipask/commit/9b5f13d1708e9a5dc0959cb8a97be1c32b94ca69 - Patch, Third Party Advisory
References () https://www.yuque.com/henry-weply/penetration/fza5hm - Third Party Advisory () https://www.yuque.com/henry-weply/penetration/fza5hm - Third Party Advisory
CVSS v2 : 4.0
v3 : 6.5
v2 : 4.0
v3 : 7.7

Information

Published : 2022-05-23 16:16

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41714

Mitre link : CVE-2021-41714

CVE.ORG link : CVE-2021-41714


JSON object : View

Products Affected

tipask

  • tipask
CWE
CWE-494

Download of Code Without Integrity Check