Skip to content

Commit e80bde5

Browse files
1 parent 1ea66d4 commit e80bde5

2 files changed

Lines changed: 6 additions & 3 deletions

File tree

advisories/github-reviewed/2026/01/GHSA-f72r-2h5j-7639/GHSA-f72r-2h5j-7639.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f72r-2h5j-7639",
4-
"modified": "2026-02-10T02:58:06Z",
4+
"modified": "2026-02-10T16:03:09Z",
55
"published": "2026-01-28T23:00:57Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-25992"
8+
],
79
"summary": "SiYuan File Read API Case Sensitivity Bypass can Lead to Path Traversal",
810
"details": "# File Read Interface Case Bypass Vulnerability\n## Vulnerability Name\nFile Read Interface Case Bypass Vulnerability\n\n## Overview\nThe `/api/file/getFile` endpoint uses **case-sensitive string equality checks** to block access to sensitive files.\nOn case-insensitive file systems such as **Windows**, attackers can bypass restrictions using mixed-case paths\nand read protected configuration files.\n\n## Impact\n- Read sensitive information in configuration files (e.g., access codes, API Tokens, sync configurations, etc.).\n- Remotely exploitable directly when the service is published without authentication.\n\n## Trigger Conditions\n- Running on a **case-insensitive file system**.\n- The caller can access `/api/file/getFile` (via CheckAuth or Token injection in published services).\n\n## PoC (Generic Example)\nAfter enabling publication:\n\n**Request:**\n```http\nPOST /api/file/getFile\nContent-Type: application/json\n\n{\"path\":\"cOnf/conf.json\"}\n```\n\n**Expected Result:**\n- Successfully return the content of the configuration file.\n\n## Root Cause\nPath comparison uses strict case-sensitive string matching, without case normalization or identical file validation.\n\n## Fix Recommendations\n- Normalize path casing before comparison (Windows/macOS).\n- Use file-level comparison methods such as `os.SameFile`.\n- Apply blacklist validation on sensitive paths **after case normalization**.\n\n## Notes\n- Environment identifiers and sensitive information have been removed.\n\n## Solution Commit\n`399a38893e8719968ea2511e177bb53e09973fa6`",
911
"severity": [

advisories/github-reviewed/2026/02/GHSA-7g56-fwxj-cm23/GHSA-7g56-fwxj-cm23.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,8 @@
5151
],
5252
"database_specific": {
5353
"cwe_ids": [
54-
"CWE-306"
54+
"CWE-306",
55+
"CWE-434"
5556
],
5657
"severity": "HIGH",
5758
"github_reviewed": true,

0 commit comments

Comments
 (0)