Soumettre #522380: opensolon https://github.com/opensolon/solon <=3.1.0 Path Traversal: '../filedir'information

Titreopensolon https://github.com/opensolon/solon <=3.1.0 Path Traversal: '../filedir'
Descriptionsolon has arbitrary file reading, when the template name can be controlled and contains beetl components, it will be found that arbitrary file reading can be performed
La source⚠️ https://github.com/Q16G/cve_detail/blob/main/solon/templateRCE.md
Utilisateur
 760046475 (UID 82919)
Soumission18/03/2025 08:01 (il y a 1 Année)
Modérer29/03/2025 20:57 (12 days later)
StatutAccepté
Entrée VulDB302014 [opensolon jusqu’à 3.1.0 org.noear.solon.core.handle.RenderManager /aa render_mav template divulgation d'information]
Points15

Interested in the pricing of exploits?

See the underground prices here!