| Titre | xiaowei1118 java_server master branch Path Traversal |
|---|
| Description | In the java_server project, the file upload API /service/uploadDetailImage contains the following issue:
Files are deleted through path concatenation without effectively validating the external parameters used in the path. The code processes "/" path separators, but on Windows systems, it is possible to bypass this by using "\" separators, allowing arbitrary file deletion.
Project Link: https://github.com/xiaowei1118/java_server
Affected Version: master branch
Affected API: /service/uploadDetailImage
Code Location: java_server-master/src/main/java/com/changyu/foryou/controller/FoodController.java:1244 |
|---|
| La source | ⚠️ https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md |
|---|
| Utilisateur | ShenxiuSecurity (UID 84374) |
|---|
| Soumission | 18/04/2025 08:22 (il y a 1 Année) |
|---|
| Modérer | 01/05/2025 14:39 (13 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 306797 [xiaowei1118 java_server sur Windows File Upload API FoodController.java directory traversal] |
|---|
| Points | 20 |
|---|