Home

Description

Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871, a Path Traversal vulnerability was identified in the gameName parameter. While the application's primary entry points implement input validation, the ParseGamestate.php component can be accessed directly as a standalone script. In this scenario, the absence of internal sanitization allows for directory traversal sequences (e.g., ../) to be processed, potentially leading to unauthorized file access. This issue has been patched in commit 6be3871.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-06 | Updated 2026-03-06 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 6be3871a14c192d1fb8146cdbc76f29f27c1cf48
affected

References

github.com/...lishar/security/advisories/GHSA-f386-xhcw-jrx8

github.com/...ommit/6be3871a14c192d1fb8146cdbc76f29f27c1cf48

cve.org (CVE-2026-28429)

nvd.nist.gov (CVE-2026-28429)

Download JSON