LocalSend path traversal vulnerability in the file upload endpoint allows nearby devices to execute arbitrary commands
Description
LocalSend is a free, open-source app that allows users to securely share files and messages with nearby devices over their local network without needing an internet connection. Prior to version 1.17.0, due to the missing sanitization of the path in the POST /api/localsend/v2/prepare-upload and the POST /api/localsend/v2/upload endpoint, a malicious file transfer request can write files to the arbitrary location on the system, resulting in the remote command execution. A malicious file transfer request sent by nearby devices can write files into an arbitrary directory. This usually allows command execution via the startup folder on Windows or Bash-related files on Linux. If the user enables the Quick Save feature, it will silently write files without explicit user interaction. Version 1.17.0 fixes this issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/localsend/localsend/commit/e8635204ec782ded45bc7d698deb60f3c4105687mitrex_refsource_MISC
- github.com/localsend/localsend/security/advisories/GHSA-f7jp-p6j4-3522mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.