漏洞标题
因`send_file`调用在Piano LED Visualizer中不正确使用,导致绝对路径转发
漏洞描述信息
由于在Piano LED Visualizer中错误使用了`send_file`调用,导致了绝对路径遍历。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H
漏洞类别
N/A
漏洞标题
Absolute Path Traversal due to incorrect use of `send_file` call in Piano LED Visualizer
漏洞描述信息
Piano LED Visualizer is software that allows LED lights to light up as a person plays a piano connected to a computer. Version 1.3 and prior are vulnerable to a path traversal attack. The `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Since the "malicious" parameter represents an absolute path, the result of `os.path.join` ignores the static directory completely. Hence, untrusted input is passed via the `os.path.join` call to `flask.send_file` can lead to path traversal attacks. A patch with a fix is available on the `master` branch of the GitHub repository. This can also be fixed by preventing flow of untrusted data to the vulnerable `send_file` function. In case the application logic necessiates this behaviour, one can either use the `flask.safe_join` to join untrusted paths or replace `flask.send_file` calls with `flask.send_from_directory` calls.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
漏洞类别
文件名或路径的外部可控制
漏洞标题
Piano LED Visualizer 安全漏洞
漏洞描述信息
Piano LED Visualizer是一个钢琴弹奏软件。 Piano LED Visualizer 1.3 版本及之前版本存在安全漏洞,该漏洞源于使用不受信任的输入时,os.path.join 不安全。
CVSS信息
N/A
漏洞类别
其他