Improper handling of locale names in kenny2automate resulted in path traversal, allowing arbitrary JSON files to be read.
5.3(Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
The lang
command passed lang parameter given by the attacker to os.path.join
without validation, which allows saving settings with locale name which resolves to relative path pointing to non-locale file. The setting is later used to read the locale file, which allows the attacker to read arbitrary JSON files stored in the computer.