Súbít #700182: GitHub cherry-studio-TykoFork 0.0.1 OS Command Injectionbayani

KuraGitHub cherry-studio-TykoFork 0.0.1 OS Command Injection
GaskiyaThe TokyoTech client has a flawed implementation where it fails to sanitize metadata during OAuth server discovery. Specifically, the authorization_endpoint URL provided by the server is passed directly to an insecure open function. An attacker can exploit this by embedding a payload in the URL's authentication field, bypassing validation and achieving arbitrary OS command injection on the client's host machine.
Manga⚠️ https://lavender-bicycle-a5a.notion.site/TokyoTech-RCE-26153a41781f80b6a370d427a6d307f0?source=copy_link
Màdùmga
 yhryhryhr_miemie (UID 65492)
Furta11/23/2025 14:15 (3 Wurɗi 전)
Gargajiya12/07/2025 08:58 (14 days later)
HalittaShingilam
VulDB gite334647 [TykoDev cherry-studio-TykoFork 0.1 OAuth Server Discovery oauth-authorization-server redirectToAuthorization authorizationUrl kura hakki ndiyam]
Nganji17

Interested in the pricing of exploits?

See the underground prices here!