A vulnerability, which was classified as critical, was found in Steel Browser up to 0.1.3. This affects the function handleFileUpload of the file api/src/modules/files/files.routes.ts. The manipulation of the argument filename leads to path traversal. It is possible to initiate the attack remotely. The patch is named 7ba93a10000fb77ee01731478ef40551a27bd5b9. It is recommended to apply a patch to fix this issue.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://vuldb.com/?id.312627 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.312627 | permissions required signature vdb entry |
https://vuldb.com/?submit.593060 | third party advisory vdb entry |
https://github.com/steel-dev/steel-browser/issues/129 | issue tracking exploit |
https://github.com/steel-dev/steel-browser/issues/129#issuecomment-2936052240 | issue tracking exploit |
https://github.com/steel-dev/steel-browser/commit/7ba93a10000fb77ee01731478ef40551a27bd5b9 | patch |