The script writes generated JSON to a predefined path (/script/flakes/input.json) for test data consumption.
Hardcoded INPUT_PATH enables directory escape sequences, allowing arbitrary file overwrite if path contains ../.
Likelihood:
Reason 1 // High during CI/CD execution with user-controllable inputs
Reason 2 // Certain when integrating with external systems
Reason 3 // Guaranteed if project root is writable to attackers
Impact:
Impact 1 Permanent deletion of critical system files
Impact 2 Remote code execution via config file tampering
Impact 3 Complete CI/CD pipeline compromise
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.