LLMs helped perpetuate a path traversal bug from 2010
Briefly

A path traversal vulnerability originating from a 2010 GitHub Gist has endured numerous attempts to be resolved, highlighted by its integration into LLMs and various documentation. Despite warnings from developers regarding its risks, the flaw continued to mislead programmers and even appeared in educational resources. To combat this issue, a team led by Jafar Akhoundali is developing an automated system designed to detect, exploit, and patch this vulnerability across GitHub, claiming to eliminate false positives by using sandbox environments for verification.
The vulnerable code snippet was found first in 2010 in a GitHub Gist, and it spread to Stack Overflow, famous companies, tutorials, and even university courses.
Most people failed to point out it's vulnerable, and although the vulnerability is simple, some small details prevented most users from seeing the vulnerability.
We created an automated pipeline that can detect, exploit, and patch this vulnerability across GitHub projects, automatically.
One of the main advantages of this method is that it does not have any false positives as vulnerabilities are first checked via an exploit in a sandbox environment.
Read at Theregister
[
|
]