| शीर्षक | tinyfilemanager 2.6 File Upload(RCE) |
|---|
| विवरण | Hello, this is arrester.
In TinyFileManager version 2.6, I discovered a vulnerability where the fullpath parameter allows specifying an arbitrary upload path. Although it filters directory traversal attempts such as '../', the extension validation is insufficient, making it possible to upload a web shell to the specified path. This can lead to remote command execution and full server compromise.
I reported this issue in August and received confirmation that the vulnerability exists, but since the remediation process was taking a long time, I followed up with an additional email. After about two months, I received a response stating that it was acceptable to disclose the vulnerability. Because this is a high-risk issue requiring prompt action from users, and for the purpose of obtaining a CVE, I am submitting it to VulDB.
Thank you. |
|---|
| स्रोत | ⚠️ https://mesquite-dream-86b.notion.site/tinyfilemanager-File-Upload-RCE-Report-2c7512562197800d86b3e68534a56a91 |
|---|
| उपयोगकर्ता | arrester (UID 93048) |
|---|
| सबमिशन | 12/12/2025 04:06 PM (4 महीनों पहले) |
|---|
| संयम | 27/12/2025 11:07 AM (15 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 338516 [prasathmani TinyFileManager तक 2.6 tinyfilemanager.php fullpath निर्देशिका ट्रैवर्सल] |
|---|
| अंक | 17 |
|---|