julien040/anyquery CVE Request 3: Path Traversal in read_parquet Module
-
Title: Path Traversal Vulnerability in
read_parquetModule Due to Unvalidated File Path -
Affected Component:
module/read_parquet.go,PrepareMethod -
Attack Vector: Malicious SQL query, such as
SELECT * FROM read_parquet('../../../../../etc/shadow' AS path). -
Description: The
read_parquettable function uses file paths from user input without checking for traversal, which can lead to unauthorized file reads. -
Vulnerability Type: Path Traversal (CWE-22)
-
Impact: Any file accessible to
anyquerycould be exposed, including highly sensitive system and application data. -
Suggested Fix: Normalize the input path using
filepath.Clean, resolve it absolutely, and enforce that it stays within a defined base path. -

浙公网安备 33010602011771号