You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the deploy files there is a bad configuration in the nginx alias where it is possible to perform a traversal path to access files on the server running the QA-Board. An attacker can use this to scour files on the server that could compromise QA-Board users/customers.
For the technique to be applicable, the following conditions must be met:
The location directive should not have a trailing slash in its path;
An aliasdirective must be present within the location context, and it must end with a slash.
From the procedures of the deploy steps I was able to carry out the proof of concept:
git clone https://github.com/Samsung/qaboard.git
cd qaboard
docker-compose pull
docker-compose up -d
Hello Team,
In the deploy files there is a bad configuration in the nginx alias where it is possible to perform a traversal path to access files on the server running the QA-Board. An attacker can use this to scour files on the server that could compromise QA-Board users/customers.
For the technique to be applicable, the following conditions must be met:
From the procedures of the deploy steps I was able to carry out the proof of concept:
Steps to Reproduce
I apologize if this is of no use to you.
Best Regards,
dk4trin.
The text was updated successfully, but these errors were encountered: