Description
A security flaw has been discovered in glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393. This affects the function uploadTestcaseZipUrl of the file business/business-oj/src/main/java/com/glowxq/oj/problem/controller/ProblemCaseController.java. Performing a manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2026-03-15: | Advisory disclosed |
| 2026-03-15: | VulDB entry created |
| 2026-03-15: | VulDB entry last update |
Credits
xcxr (VulDB User)
VulDB
References
vuldb.com/?id.351112 (VDB-351112 | glowxq glowxq-oj ProblemCaseController.java uploadTestcaseZipUrl server-side request forgery)
vuldb.com/?ctiid.351112 (VDB-351112 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.770476 (Submit #770476 | glowxq glowxq-oj 1.0.0 Server-Side Request Forgery)
fx4tqqfvdw4.feishu.cn/...1LExSdlfcC3jwn1c?from=from_copylink