Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Vociferous Unauthenticated Remote Path Traversal (RCE via CSRF)
Vulnerability Description
Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by the backends filesystem logic. Because the API is unauthenticated and the CORS configuration in app.py is overly permissive (allow_origins=["*"] or allowing localhost), an external attacker can bypass the UI entirely. By using directory traversal sequences (../), an attacker can force the app to write arbitrary data to any location accessible by the current user's permissions. This vulnerability is fixed in 4.4.2.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Vociferous 访问控制错误漏洞
Vulnerability Description
Vociferous是Andrew Brown个人开发者的一个跨平台离线语音转文字工具。 Vociferous 4.4.2之前版本存在访问控制错误漏洞,该漏洞源于src/api/system.py中export_file路由未验证文件名,且API未经验证和CORS配置过于宽松,可能导致攻击者通过目录遍历序列将任意数据写入任意位置。
CVSS Information
N/A
Vulnerability Type
N/A