### [CVE-2020-35284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35284) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Flamingo (aka FlamingoIM) through 2020-09-29 allows ../ directory traversal because the only ostensibly unpredictable part of a file-transfer request is an MD5 computation; however, this computation occurs on the client side, and the computation details can be easily determined because the product's source code is available. ### POC #### Reference - https://github.com/balloonwj/flamingo/issues/48 - https://github.com/balloonwj/flamingo/issues/48 #### Github No PoCs found on GitHub currently.