Property
Languagepython
Severitylow
CWECWE-73: External Control of File Name or Path
OWASPA04:2021 - Insecure Design
Confidence LevelLow
Impact LevelMedium
Likelihood LevelLow

Description#

The code uses a user-supplied filename directly in the flask.send_file() function without sanitizing the input. This allows attackers to request and access arbitrary files on the server.

Impact#

If exploited, an attacker could download sensitive or private files from the server, such as configuration files, credentials, or application source code. This can lead to data breaches, exposure of secrets, and compromise of the application or underlying system.