Enviar #792336: SonicCloudOrg sonic-server 2.0.0 Injectioninformación

TítuloSonicCloudOrg sonic-server 2.0.0 Injection
DescripciónSonic Server provides file upload functionality through two endpoints: /upload and /upload/v2. Both endpoints accept a type parameter that is intended to specify the upload directory category (e.g., "keepFiles", "imageFiles", "recordFiles", "logFiles", "packageFiles"). However, the application does not enforce any validation on this parameter, allowing an attacker to supply directory traversal sequences such as ../ or ..\\. The vulnerable code in FileTool.java directly concatenates the user-controlled folderName parameter into the file path without sanitization. It then uses mkdirs() to create directories and transferTo() to write files at the attacker-specified location, effectively bypassing any intended directory restrictions.
Fuente⚠️ https://github.com/ccccccctiiiiiiii-lab/public_exp/issues/2
Usuario
 cccccccti (UID 96695)
Sumisión2026-03-29 11:24 (hace 23 días)
Moderación2026-04-19 18:23 (21 days later)
EstadoAceptado
Entrada de VulDB358255 [SonicCloudOrg sonic-server hasta 2.0.0 File Upload Endpoint FileTool.java upload Escribe recorrido de directorios]
Puntos20

Might our Artificial Intelligence support you?

Check our Alexa App!