Submit #723220: https://github.com/yeqifu carRental latest Path Traversalinfo

Titlehttps://github.com/yeqifu carRental latest Path Traversal
DescriptioncarRental is an open-source web application developed based on SpringBoot. In carRental, there is neither permission verification nor input sanitization, which allows for path traversal and the ability to read arbitrary files. com.yeqifu.sys.controller.FileController#downloadShowFile is the entrance to the taint, no authorization is required. The downloadFile() function in the com.yeqifu.sys.utils.AppFileUtils class does not filter the incoming path parameter and fails to validate, allowing attackers to inject characters such as ../ to perform path traversal, ultimately leading to arbitrary file download. The value of the path parameter uses a relative path format, allowing any file to be downloaded.
Source⚠️ https://github.com/yeqifu/carRental/issues/46
User
 mukyuuhate (UID 93052)
Submission12/24/2025 14:26 (4 months ago)
Moderation01/01/2026 12:31 (8 days later)
StatusAccepted
VulDB entry339354 [yeqifu carRental up to 3fabb7eae93d209426638863980301d6f99866b3 com.yeqifu.sys.controller.FileController downloadShowFile.action downloadShowFile path path traversal]
Points20

Interested in the pricing of exploits?

See the underground prices here!