You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As file IDs are part of encrypted messages, a malicious submitter could set as file ID an arbitrary value, which is then used to create the relative URL to fetch it.
If the malicious submitter sets as file ID ../path/to/another/API?junk= could force the victim's client to perform a GET request to an arbitrary API (i.e. https://secure....onion/path/to/another/API?junk=<junk>).
The text was updated successfully, but these errors were encountered:
As file IDs are part of encrypted messages, a malicious submitter could set as file ID an arbitrary value, which is then used to create the relative URL to fetch it.
If the malicious submitter sets as file ID
../path/to/another/API?junk=
could force the victim's client to perform a GET request to an arbitrary API (i.e.https://secure....onion/path/to/another/API?junk=<junk>
).The text was updated successfully, but these errors were encountered: