SYM_PY_0123 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

External Control of File Name or Path

Property Value
Language python
Severity low
CWE CWE-73: External Control of File Name or Path
OWASP A04:2021 - Insecure Design
Confidence Level Low
Impact Level Medium
Likelihood Level Low

Description

The code uses a user-supplied filename directly in the flask.send_file() function without sanitizing the input. This allows attackers to request and access arbitrary files on the server.

Impact

If exploited, an attacker could download sensitive or private files from the server, such as configuration files, credentials, or application source code. This can lead to data breaches, exposure of secrets, and compromise of the application or underlying system.