| 제목 | ujcms 101.2 Recursive Deletion of Template Storage |
|---|
| 설명 | A logical vulnerability exists in the WebFileTemplateController.delete method. While the application implements a blacklist mechanism (checkId) to prevent standard path traversal (e.g., filtering .. and \), it fails to validate "empty" or "root-equivalent" inputs.
An attacker can bypass the validation by sending a specially crafted payload (such as an empty string "" or a single forward slash /). When processed, this input resolves to the root of the configured template storage directory. The deleteDirectory function then recursively deletes all files and subdirectories within this root, effectively wiping out the website's templates, styles, and scripts. |
|---|
| 원천 | ⚠️ https://www.yuque.com/la12138/pa2fpb/lxngf3d07uyd0nwp?singleDoc |
|---|
| 사용자 | Saul1213 (UID 94577) |
|---|
| 제출 | 2026. 02. 10. AM 08:54 (3 개월 ago) |
|---|
| 모더레이션 | 2026. 02. 21. PM 10:11 (12 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 347319 [Dromara UJCMS 101.2 Template WebFileTemplateController.delete deleteDirectory 디렉토리 순회] |
|---|
| 포인트들 | 20 |
|---|