提出 #766386: Tiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Type情報

タイトルTiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Type
説明Since there is no validation of the file extension, attackers can upload files of any type (e.g., .jsp, .jspx, .exe, .sh, etc.). If the directory pointed to by CLS_Easy7_Types.file_pathis directly accessible via the web (e.g., under Tomcat's webappsdirectory) and the server configuration allows the execution of such scripts, an attacker could upload a webshell (such as a malicious JSP file) and directly access and execute the malicious code via a URL. This may lead to Remote Code Execution (RCE).
ソース⚠️ https://my.feishu.cn/docx/P3Bgdl9BHocn66xCMpCcgCD7nhe?from=from_copylink
ユーザー
 Anonymous User
送信2026年02月24日 09:33 (1 月 ago)
モデレーション2026年03月08日 12:23 (12 days later)
ステータス承諾済み
VulDBエントリ349764 [Tiandy Video Surveillance System 视频监控平台 7.17.0 CLS_REST_File.java uploadFile fileName 特権昇格]
ポイント20

Do you need the next level of professionalism?

Upgrade your account now!