| Titel | xiaowei1118 java_server master branch Path Traversal |
|---|
| Beschreibung | In the java_server project, the file upload API /service/uploadDetailImage contains the following issue:
Files are deleted through path concatenation without effectively validating the external parameters used in the path. The code processes "/" path separators, but on Windows systems, it is possible to bypass this by using "\" separators, allowing arbitrary file deletion.
Project Link: https://github.com/xiaowei1118/java_server
Affected Version: master branch
Affected API: /service/uploadDetailImage
Code Location: java_server-master/src/main/java/com/changyu/foryou/controller/FoodController.java:1244 |
|---|
| Quelle | ⚠️ https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md |
|---|
| Benutzer | ShenxiuSecurity (UID 84374) |
|---|
| Einreichung | 18.04.2025 08:22 (vor 1 Jahr) |
|---|
| Moderieren | 01.05.2025 14:39 (13 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 306797 [xiaowei1118 java_server bis 11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a auf Windows File Upload API FoodController.java Directory Traversal] |
|---|
| Punkte | 20 |
|---|