提出 #756156: fastapiadmin <= 2.2.0 Unrestricted Upload情報

タイトルfastapiadmin <= 2.2.0 Unrestricted Upload
説明An unrestricted file upload vulnerability in FastapiAdmin (≤ 2.2.0) at /api/v1/system/user/current/avatar/upload allows authenticated users to write arbitrary files to the server filesystem and, when combined with the scheduled task APIs, achieve remote code execution; the upload routine trusts the Content-Type header to infer allowed extensions, does not validate or canonicalize file paths, and writes files directly under the upload directory, enabling attackers to bypass extension checks (e.g., upload a Python script disguised as an SVG), persist it, and trigger execution via task scheduling. Mitigations include enforcing server-side content inspection (validate file magic bytes), deriving extensions from content not headers, normalizing and restricting saved paths to a safe upload directory with no execute permissions, generating safe randomized filenames, imposing strict allowlists for upload types, scanning uploads for dangerous content, and requiring least-privilege access controls and audit logging for upload and task APIs.
ソース⚠️ https://github.com/CC-T-454455/Vulnerabilities/tree/master/fastapi-admin/vulnerability-5
ユーザー
 Anonymous User
送信2026年02月11日 09:59 (3 月 ago)
モデレーション2026年02月22日 16:09 (11 days later)
ステータス承諾済み
VulDBエントリ347363 [FastApiAdmin 迄 2.2.0 Scheduled Task API controller.py user_avatar_upload_controller 特権昇格]
ポイント20

Do you want to use VulDB in your project?

Use the official API to access entries easily!