Closed gitauto-ai[bot] closed 3 months ago
@gstraccini review
@gstraccini review
Reviewing this pull request.
Commits included:
SHA: 791c7332022fc520cda1f1f990ee776b451ddf3b
SHA: fbaf879cfac99a1e788aa678dff103fe9a3bee01
SHA: d790353df5fe9d63663a7eb3c873dbf316cc0803
! :eyes:
Infisical secrets check: :rotating_light: Secrets leaked!
Scan results:
1:37AM INF scanning for exposed secrets...
1:37AM INF 75 commits scanned.
1:37AM INF scan completed in 257ms
1:37AM WRN leaks found: 2
Reviewing this pull request.
Commits included:
SHA: 791c7332022fc520cda1f1f990ee776b451ddf3b
SHA: fbaf879cfac99a1e788aa678dff103fe9a3bee01
SHA: d790353df5fe9d63663a7eb3c873dbf316cc0803
SHA: 04b62390348d54d0d57e3f397a0d2cfcd09fc73a
SHA: f7a26670a1fbb15df27ee2ce69e25f885c470d33
! :eyes:
Original issue: #29
Why the bug occurs
The bug occurs due to the use of unsanitized user input in file path operations, which makes the application vulnerable to path injection attacks. This can allow an attacker to manipulate file paths and potentially access unauthorized files or directories.
How to reproduce
../../../../etc/passwd
) into the user input field.How to fix
Changes made:
Src/Geral/Includes/favicon.php
to sanitize user inputs.Src/Geral/Static/utils.js
to ensure safe file path operations.Test these changes locally