We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An arbitrary file overwrite vulnerability exists in the ZulipConnector of danswer-ai/danswer, affecting the latest version. The vulnerability arises from the load_credentials method, where user-controlled input for realm_name and zuliprc_content is used to construct file paths and write file contents. This allows attackers to overwrite or create arbitrary files if a zuliprc- directory already exists in the temporary directory.
Reserved 2024-08-19 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_aiCWE-29 Path Traversal: '\..\filename'
huntr.com/bounties/21e9b909-036c-4544-ad35-6a5117836275
Support options