提出 #792336: SonicCloudOrg sonic-server 2.0.0 Injection情報

タイトルSonicCloudOrg sonic-server 2.0.0 Injection
説明Sonic Server provides file upload functionality through two endpoints: /upload and /upload/v2. Both endpoints accept a type parameter that is intended to specify the upload directory category (e.g., "keepFiles", "imageFiles", "recordFiles", "logFiles", "packageFiles"). However, the application does not enforce any validation on this parameter, allowing an attacker to supply directory traversal sequences such as ../ or ..\\. The vulnerable code in FileTool.java directly concatenates the user-controlled folderName parameter into the file path without sanitization. It then uses mkdirs() to create directories and transferTo() to write files at the attacker-specified location, effectively bypassing any intended directory restrictions.
ソース⚠️ https://github.com/ccccccctiiiiiiii-lab/public_exp/issues/2
ユーザー
 cccccccti (UID 96695)
送信2026年03月29日 11:24 (23 日 ago)
モデレーション2026年04月19日 18:23 (21 days later)
ステータス承諾済み
VulDBエントリ358255 [SonicCloudOrg sonic-server 迄 2.0.0 File Upload Endpoint FileTool.java upload タイプ ディレクトリトラバーサル]
ポイント20

Do you know our Splunk app?

Download it now for free!