| タイトル | Tiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Type |
|---|
| 説明 | Since there is no validation of the file extension, attackers can upload files of any type (e.g., .jsp, .jspx, .exe, .sh, etc.). If the directory pointed to by CLS_Easy7_Types.file_pathis directly accessible via the web (e.g., under Tomcat's webappsdirectory) and the server configuration allows the execution of such scripts, an attacker could upload a webshell (such as a malicious JSP file) and directly access and execute the malicious code via a URL. This may lead to Remote Code Execution (RCE). |
|---|
| ソース | ⚠️ https://my.feishu.cn/docx/P3Bgdl9BHocn66xCMpCcgCD7nhe?from=from_copylink |
|---|
| ユーザー | Anonymous User |
|---|
| 送信 | 2026年02月24日 09:33 (1 月 ago) |
|---|
| モデレーション | 2026年03月08日 12:23 (12 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 349764 [Tiandy Video Surveillance System 视频监控平台 7.17.0 CLS_REST_File.java uploadFile fileName 特権昇格] |
|---|
| ポイント | 20 |
|---|