Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FIXME: directory traversal vulnerability in agent codepath #620

Merged
merged 1 commit into from
May 24, 2024

Conversation

shenping-bd
Copy link
Collaborator

Function Load() could be used to overwrite any files with user-controlled input of plugin name.

Before downloading, must validation the target path and restrict the directory where the plugins are to be stored.

Function Load() could be used to overwrite any files with
user-controlled input of plugin name.

Must do path validation before further procedure of plugin
downlaoding.

Signed-off-by: shenping.matt <shenping.matt@bytedance.com>
@TaeRoen TaeRoen merged commit 4986e35 into main May 24, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants