A directory traversal vulnerability exists in modelscope/agentscope version 0.0.4. An attacker can exploit this vulnerability to read any local JSON file by sending a crafted POST request to the /read-examples endpoint.
The product allows user input to control or influence paths or file names that are used in filesystem operations.
Link | Tags |
---|---|
https://huntr.com/bounties/cc4acf33-700d-4220-8a8a-db28f5c4cc8f | exploit |