إرسال #522380: opensolon https://github.com/opensolon/solon <=3.1.0 Path Traversal: '../filedir'المعلومات

عنوانopensolon https://github.com/opensolon/solon <=3.1.0 Path Traversal: '../filedir'
الوصفsolon has arbitrary file reading, when the template name can be controlled and contains beetl components, it will be found that arbitrary file reading can be performed
المصدر⚠️ https://github.com/Q16G/cve_detail/blob/main/solon/templateRCE.md
المستخدم
 760046475 (UID 82919)
ارسال18/03/2025 08:01 AM (1 سنة منذ)
الاعتدال29/03/2025 08:57 PM (12 days later)
الحالةتمت الموافقة
إدخال VulDB302014 [opensolon حتى 3.1.0 org.noear.solon.core.handle.RenderManager /aa render_mav template الكشف عن المعلومات]
النقاط15

Want to know what is going to be exploited?

We predict KEV entries!