Skip to content

[Security Bug] Path Traversal Vulnerability in the API. #681

@slash0x99

Description

@slash0x99

Describe the bug


When performing static code analysis, if a parameter received in the API is forwarded directly to the user without validation, a critical vulnerability arises.In the Devika.py file, the /api/get-browser-snapshot endpoint takes the query from the request and sends the specified file to the user. Since there is no filtering or additional validation, any file can be sent to the user.

PoC


The vulnerability arises as you can see from below.

  • Vulnerable Endpoint: localhost:1337/api/get-browser-snapshot?snapshot_path=
  • Payload: ../../../../../../etc/passwd

Url:
Image

File Content:
Image

Vulnerable Code Snippet:
Image

Mitigation


Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions