File Read Interface Case Bypass Vulnerability
The /api/file/getFile endpoint uses case-sensitive string equality checks to block access to sensitive files.
On case-insensitive file systems such as Windows, attackers can bypass restrictions using mixed-case paths
and read protected configuration files.
/api/file/getFile (via CheckAuth or Token injection in published services).After enabling publication:
Request:
POST /api/file/getFile
Content-Type: application/json
{"path":"cOnf/conf.json"}
Expected Result: - Successfully return the content of the configuration file.
Path comparison uses strict case-sensitive string matching, without case normalization or identical file validation.
os.SameFile.399a38893e8719968ea2511e177bb53e09973fa6
{
"nvd_published_at": "2026-02-10T18:16:38Z",
"github_reviewed_at": "2026-01-28T23:00:57Z",
"severity": "HIGH",
"cwe_ids": [
"CWE-178",
"CWE-22",
"CWE-426"
],
"github_reviewed": true
}