Skip to content
This repository was archived by the owner on Oct 26, 2025. It is now read-only.
This repository was archived by the owner on Oct 26, 2025. It is now read-only.

fix: Vulnerabilities: Input Sanitization #712

@rflihxyz

Description

@rflihxyz
  • Unsanitized Dynamic Input in File Path
    Description: The method fetchFileStreamFromURL in index.ts is vulnerable to unsanitized file path input.
    Location: packages/api/src/ticketing/@lib/@utils/index.ts
    Line: 11
    Repository: panoratech/Panora

  • Unsanitized Dynamic Input in File Path
    Description: Constructs a file path using unsanitized input, which may lead to a path traversal vulnerability.
    Location: packages/api/src/@core/connections/@utils/base.js
    Line: 81
    Repository: panoratech/Panora

  • Unsanitized Dynamic Input in File Path
    Description: The function updateFileContents in connectorUpdate.js is vulnerable to unsanitized input.
    Location: packages/api/scripts/connectorUpdate.js
    Line: 119
    Repository: panoratech/Panora

  • Unsanitized Dynamic Input in File Path
    Description: Unsanitized dynamic input in file path, allowing for potential path traversal.
    Location: packages/api/src/ats/attachment/services/ashby.js
    Line: 62
    Repository: panoratech/Panora

  • Unsanitized Dynamic Input Detected
    Description: Unsanitized input in dynamic file path at connectorUpdate.js.
    Location: packages/api/scripts/connectorUpdate.js
    Line: 293
    Repository: panoratech/Panora

  • Vulnerable Unsanitized Dynamic Input
    Description: Code has unsanitized dynamic input that poses a path traversal risk.
    Location: packages/api/scripts/connectorUpdate.js
    Line: 372
    Repository: panoratech/Panora

  • Unsanitized Dynamic Input Detected
    Description: Dynamic input used unsafely in file path, vulnerable to path traversal attacks.
    Location: packages/api/scripts/connectorUpdate.js
    Line: 346
    Repository: panoratech/Panora

  • Unsanitized Dynamic Input Detected
    Description: Unsanitized input leads to potential path traversal vulnerability.
    Location: packages/api/scripts/connectorUpdate.js
    Line: 442 - 445
    Repository: panoratech/Panora

  • Unsanitized Dynamic Input Detected
    Description: Dynamic input not properly sanitized in file path, leading to security risk.
    Location: packages/api/scripts/connectorUpdate.js
    Line: 377
    Repository: panoratech/Panora

  • Vulnerable Unsanitized Dynamic Input
    Description: Unsanitized input allows for file path manipulation.
    Location: packages/api/scripts/connectorUpdate.js
    Line: 477 - 480
    Repository: panoratech/Panora

  • Unsanitized Dynamic Input Detected
    Description: File path uses unsanitized dynamic input.
    Location: packages/api/scripts/connectorUpdate.js
    Line: 428
    Repository: panoratech/Panora

  • Unsanitized Dynamic Input Detected
    Description: Unsafe dynamic input in file path at connectorUpdate.js.
    Location: packages/api/scripts/connectorUpdate.js
    Line: 289
    Repository: panoratech/Panora

Metadata

Metadata

Assignees

Labels

Core-TeamSensitive issues that are not open to publicbackendprioritythese issues needs to prioritize before others

Type

No type

Projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions