top of page
perceptive_background_267k.jpg

Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871, a Path Traversal vulnerability was identified in the gameName parameter. While the appl…

Published:

5 maart 2026 om 23:00:00

Alert date:

6 maart 2026 om 06:03:40

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies

A Path Traversal vulnerability was discovered in Talishar, a fan-made Flesh and Blood project. The vulnerability exists in the gameName parameter of the ParseGamestate.php component, which can be accessed directly as a standalone script. The absence of internal sanitization allows directory traversal sequences (../) to be processed, potentially leading to unauthorized file access. While the application's primary entry points implement input validation, this component bypasses those protections when accessed directly. The issue has been patched in commit 6be3871.

Technical details

Mitigation steps:

Affected products:

Talishar

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page