| Kura | GitHub cherry-studio-TykoFork 0.0.1 OS Command Injection |
|---|
| Gaskiya | The TokyoTech client has a flawed implementation where it fails to sanitize metadata during OAuth server discovery. Specifically, the authorization_endpoint URL provided by the server is passed directly to an insecure open function. An attacker can exploit this by embedding a payload in the URL's authentication field, bypassing validation and achieving arbitrary OS command injection on the client's host machine. |
|---|
| Manga | ⚠️ https://lavender-bicycle-a5a.notion.site/TokyoTech-RCE-26153a41781f80b6a370d427a6d307f0?source=copy_link |
|---|
| Màdùmga | yhryhryhr_miemie (UID 65492) |
|---|
| Furta | 11/23/2025 14:15 (3 Wurɗi 전) |
|---|
| Gargajiya | 12/07/2025 08:58 (14 days later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 334647 [TykoDev cherry-studio-TykoFork 0.1 OAuth Server Discovery oauth-authorization-server redirectToAuthorization authorizationUrl kura hakki ndiyam] |
|---|
| Nganji | 17 |
|---|