제출 #792336: SonicCloudOrg sonic-server 2.0.0 Injection정보

제목SonicCloudOrg sonic-server 2.0.0 Injection
설명Sonic Server provides file upload functionality through two endpoints: /upload and /upload/v2. Both endpoints accept a type parameter that is intended to specify the upload directory category (e.g., "keepFiles", "imageFiles", "recordFiles", "logFiles", "packageFiles"). However, the application does not enforce any validation on this parameter, allowing an attacker to supply directory traversal sequences such as ../ or ..\\. The vulnerable code in FileTool.java directly concatenates the user-controlled folderName parameter into the file path without sanitization. It then uses mkdirs() to create directories and transferTo() to write files at the attacker-specified location, effectively bypassing any intended directory restrictions.
원천⚠️ https://github.com/ccccccctiiiiiiii-lab/public_exp/issues/2
사용자
 cccccccti (UID 96695)
제출2026. 03. 29. AM 11:24 (23 날 ago)
모더레이션2026. 04. 19. PM 06:23 (21 days later)
상태수락
VulDB 항목358255 [SonicCloudOrg sonic-server 까지 2.0.0 File Upload Endpoint FileTool.java upload 유형 디렉토리 순회]
포인트들20

Interested in the pricing of exploits?

See the underground prices here!