-
Notifications
You must be signed in to change notification settings - Fork 155
Open
Description
Recently, our team found an arbitrary favorite delete vulnerability in the latest version of the project.
The vulnerability logic is present in the file:
Line 60 in 755f19a
| authed.POST("favorites/delete", api.DeleteFavoriteHandler()) |
The operation is not protected by permission checks, which means an attacker can achievearbitrary favorite delete.
To address this vulnerability, we strongly advise that developers implement access control policies that limit API access to admin users or the owner.
Metadata
Metadata
Assignees
Labels
No labels