提出 #754041: feiyuchuixue https://github.com/feiyuchuixue/sz-boot-parent sz-boot-parent <= v1.3.2-beta Arbitrary_File_Read情報

タイトルfeiyuchuixue https://github.com/feiyuchuixue/sz-boot-parent sz-boot-parent <= v1.3.2-beta Arbitrary_File_Read
説明The API `/api/admin/common/download/templates?templateName=../application.yml` is vulnerable to **directory traversal**, which allows attackers to read arbitrary resource files on the server. In the `CommonServiceImpl.java` file, the `templateName` parameter is directly concatenated to the `templatePath` that starts with `classpath:/templates/` for resource acquisition. This improper parameter handling enables attackers to use the `../` sequence to break out of the `templates` directory, thereby gaining unauthorized access to and reading any resource file on the server.
ソース⚠️ https://github.com/yuccun/CVE/blob/main/sz-boot-parent-Path_Traversal_to_Arbitrary_Resource_File_Read.md
ユーザー
 yuccun (UID 93614)
送信2026年02月07日 20:08 (3 月 ago)
モデレーション2026年02月25日 09:32 (18 days later)
ステータス承諾済み
VulDBエントリ347746 [feiyuchuixue sz-boot-parent 迄 1.3.2-beta API templates templateName ディレクトリトラバーサル]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!