Description
A vulnerability was found in 666ghj MiroFish up to 0.1.2. This affects the function get_simulation_posts of the file backend/app/api/simulation.py of the component Query Parameter Handler. Performing a manipulation of the argument Platform results in path traversal. The attack can be initiated remotely. The exploit has been made public and could be used.
Problem types
Product status
0.1.1
0.1.2
Timeline
| 2026-04-26: | Advisory disclosed |
| 2026-04-26: | VulDB entry created |
| 2026-04-26: | VulDB entry last update |
Credits
York Shen (VulDB User)
References
vuldb.com/vuln/359632 (VDB-359632 | 666ghj MiroFish Query Parameter simulation.py get_simulation_posts path traversal)
vuldb.com/vuln/359632/cti (VDB-359632 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/798605 (Submit #798605 | 666ghj MiroFish 0.1.2 Arbitrary SQLite Database Read)
github.com/666ghj/MiroFish/issues/489
github.com/666ghj/MiroFish/