Jan v0.4.12 was discovered to contain an arbitrary file read vulnerability via the /v1/app/readFileSync interface.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize 'dir\..\..\filename' (multiple internal backslash dot dot) sequences that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://github.com/HackAllSec/CVEs/tree/main/Jan%20AFR%20vulnerability | third party advisory exploit |