<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Path Traversal on gryfman</title><link>https://gryfman.fr/tags/path-traversal/</link><description>Recent content in Path Traversal on gryfman</description><generator>Hugo</generator><language>en-us</language><managingEditor>sussetnoe2004@gmail.com (gryfman)</managingEditor><webMaster>sussetnoe2004@gmail.com (gryfman)</webMaster><lastBuildDate>Mon, 27 Apr 2026 00:00:05 +0200</lastBuildDate><atom:link href="https://gryfman.fr/tags/path-traversal/index.xml" rel="self" type="application/rss+xml"/><item><title>ZipSlip RCE plugin: CVE-2026-41463</title><link>https://gryfman.fr/cves/cve-2026-41463/</link><pubDate>Mon, 27 Apr 2026 00:00:05 +0200</pubDate><author>sussetnoe2004@gmail.com (gryfman)</author><guid>https://gryfman.fr/cves/cve-2026-41463/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;During the same security research on ProjeQtOr, we identified another interesting vulnerability, this time in the plugin upload mechanism.&lt;/p&gt;
&lt;p&gt;I already introduced what ProjeQtOr is and why it can contain sensitive business data in the first article of this series: 
&lt;a href="https://gryfman.fr/cves/cve-2026-41462"&gt;From login to admin : CVE-2026-41462&lt;/a&gt;
.&lt;/p&gt;
&lt;p&gt;This vulnerability is different from the SQL injection one. Instead of attacking the database directly, it abuses the way the application extracts uploaded plugin archives.&lt;/p&gt;</description></item><item><title>Reading outside the logs : CVE-2026-41465</title><link>https://gryfman.fr/cves/cve-2026-41465/</link><pubDate>Mon, 27 Apr 2026 00:00:03 +0200</pubDate><author>sussetnoe2004@gmail.com (gryfman)</author><guid>https://gryfman.fr/cves/cve-2026-41465/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;This post is about a path traversal vulnerability affecting the log file viewer in ProjeQtOr.&lt;/p&gt;
&lt;h1 id="the-general-introduction-to-projeqtor-is-available-in-the-first-article-of-this-series-from-login-to-admin--cve-2026-41462"&gt;&amp;laquo;&amp;laquo;&amp;laquo;&amp;lt; HEAD
The general introduction to ProjeQtOr is available in the first article of this series: 
&lt;a href="https://gryfman.fr/cves/cve-2026-41462/"&gt;From login to admin : CVE-2026-41462&lt;/a&gt;
.&lt;/h1&gt;
&lt;p&gt;The general introduction to ProjeQtOr is available in the first article of this series: 
&lt;a href="https://gryfman.fr/cve/cve-2026-41462/"&gt;From login to admin : CVE-2026-41462&lt;/a&gt;
.&lt;/p&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;dev&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;This vulnerability is another concept that is not as flashy as the previous ones, but still important, that is Path Traversal. It allows an attacker to read files on the server that should not be accessible, in this case log files.&lt;/p&gt;</description></item></channel></rss>