| Title | xiaowei1118 java_server master branch Path Traversal |
|---|
| Description | In the java_server project, the file upload API /service/uploadDetailImage contains the following issue:
Files are deleted through path concatenation without effectively validating the external parameters used in the path. The code processes "/" path separators, but on Windows systems, it is possible to bypass this by using "\" separators, allowing arbitrary file deletion.
Project Link: https://github.com/xiaowei1118/java_server
Affected Version: master branch
Affected API: /service/uploadDetailImage
Code Location: java_server-master/src/main/java/com/changyu/foryou/controller/FoodController.java:1244 |
|---|
| Source | ⚠️ https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md |
|---|
| User | ShenxiuSecurity (UID 84374) |
|---|
| Submission | 04/18/2025 08:22 (1 Year ago) |
|---|
| Moderation | 05/01/2025 14:39 (13 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 306797 [xiaowei1118 java_server up to 11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a on Windows File Upload API FoodController.java path traversal] |
|---|
| Points | 20 |
|---|