Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security Vulnerability - Arbitrary File Deletion via HTTP GET /tcdrop/deleteCachedFile #234

Open
tankeehock opened this issue Apr 26, 2024 · 0 comments

Comments

@tankeehock
Copy link

Heyyy! The endpoint "/tcdrop/deleteCachedFile" is vulnerable to arbitrary file deletion attacks. There deletion relies on a user supplied input via the "file" parameter. There is no validation of the input and if a user supplies a payload like this file=../../../../../../../../../../../tmp/abc4.txt, it can technically delete any file given whatever access right it has.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant