Enviar #747409: https://github.com/guchengwuyue/yshopmall yshopmall V1.9.1 Incomplete Identification of Uploaded File Variablesinformación

Títulohttps://github.com/guchengwuyue/yshopmall yshopmall V1.9.1 Incomplete Identification of Uploaded File Variables
DescripciónFrom function co.yixiang.modules.system.rest.SysUserController#updateAvatar to function co.yixiang.utils.FileUtil#upload. Users can freely upload malicious files such as HTML and JSP, which can lead to XSS or even RCE vulnerabilities. Taint Propagation: SysUserController.updateAvatar() Line 205: @RequestParam MultipartFile file ↓ Line 206: userService.updateAvatar(file) ↓ SysUserServiceImpl.updateAvatar() Line 185: FileUtil.upload(multipartFile, avatar) ↓ FileUtil.upload() Line 163: File dest = new File(path).getCanonicalFile() ↓ Line 169: file.transferTo(dest)
Fuente⚠️ https://github.com/guchengwuyue/yshopmall/issues/40
Usuario
 mukyuuhate (UID 93052)
Sumisión2026-01-27 14:18 (hace 3 meses)
Moderación2026-02-07 08:50 (11 days later)
EstadoAceptado
Entrada de VulDB344848 [guchengwuyue yshopmall hasta 1.9.1 co.yixiang.utils.FileUtil /api/users/updateAvatar Archivo escalada de privilegios]
Puntos20

Want to know what is going to be exploited?

We predict KEV entries!