Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rrgf-hcr9-jq6h

Опубликовано: 11 авг. 2025
Источник: github
Github: Прошло ревью
CVSS4: 6.7

Описание

TinyScientist has Path Traversal Vulnerability in PDF Review Function (CWE-22)

Description

A critical path traversal vulnerability (CWE-22) has been identified in the review_paper function in backend/app.py. The vulnerability allows malicious users to access arbitrary PDF files on the server by providing crafted file paths that bypass the intended security restrictions.

Impact

This vulnerability allows attackers to:

  • Read any PDF file accessible to the server process
  • Potentially access sensitive documents outside the intended directory
  • Perform reconnaissance on the server's file system structure

Vulnerable Code

The issue occurs in the review_paper function around line 744:

if pdf_path.startswith("/api/files/"): # Safe path handling for API routes relative_path = pdf_path[len("/api/files/"):] generated_base = os.path.join(project_root, "generated") absolute_pdf_path = os.path.join(generated_base, relative_path) else: absolute_pdf_path = pdf_path # VULNERABLE: Direct use of user input

Proof of Concept

curl -X POST http://localhost:5000/api/review \ -H "Content-Type: application/json" \ -d '{"pdf_path": "/etc/passwd"}'

Credit

This vulnerability was discovered and reported by Ruizhe.

Пакеты

Наименование

tiny-scientist

pip
Затронутые версииВерсия исправления

<= 1.1.0

Отсутствует

EPSS

Процентиль: 23%
0.00075
Низкий

6.7 Medium

CVSS4

Дефекты

CWE-22

Связанные уязвимости

nvd
6 месяцев назад

Tiny-Scientist is a lightweight framework for automating the entire lifecycle of scientific research—from ideation to implementation, writing, and review. In versions 0.1.1 and below, a critical path traversal vulnerability has been identified in the review_paper function in backend/app.py. The vulnerability allows malicious users to access arbitrary PDF files on the server by providing crafted file paths that bypass the intended security restrictions. This vulnerability allows attackers to: read any PDF file accessible to the server process, potentially access sensitive documents outside the intended directory and perform reconnaissance on the server's file system structure. This issue does not currently have a fix.

EPSS

Процентиль: 23%
0.00075
Низкий

6.7 Medium

CVSS4

Дефекты

CWE-22