Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Arbitrary file upload vulnerability exists in unauthorized interfaces #51

Open
l0nLychen opened this issue Jan 22, 2024 · 0 comments
Open

Comments

@l0nLychen
Copy link

version:v1.5.0,v1.6.0
The file upload interface /api/public/upload is not authenticated, so no authenticated users can upload files.
image

When generating the file name, the risk of directory traversal was not considered, so the randomly generated sequence and ../../../12.jar were spliced ​​together and returned as the file name, resulting in directory traversal.
image
Here it is determined whether the suffix is ​​in the whitelist, but no further processing is done, and the execution proceeds directly, resulting in the ability to upload any type of file.
image

This vulnerability can upload arbitrary files and overwrite the original files. You can overwrite scheduled task files in the system to achieve rebound shell, upload ssh key, overwrite passwd, shadow and other arbitrary files. There are significant security risks.
image
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant