In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.
Start learningUpgrade code16/sharp to version 9.22.0 or higher.
Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the generic download endpoint when the disk and path parameters are supplied in the request. An attacker can access unrelated files stored on configured storage disks by manipulating these parameters without needing authorization to the specific storage object. This is only exploitable if the attacker has an authenticated session and view access to at least one valid entity instance.
This vulnerability can be mitigated by restricting downloads.allowed_disks to the minimum required set and ensuring sensitive files are not stored on disks accessible by the generic download endpoint. Application-level controls should also be implemented to bind requested files to the authorized record.