提交 #743402: https://github.com/bolo-blog/bolo-solo bolo-solo V2.6.4 Arbitrary File Write and RCE信息

标题https://github.com/bolo-blog/bolo-solo bolo-solo V2.6.4 Arbitrary File Write and RCE
描述In the bolo-solo version v2.6.4_stable, there is a remote code execution (RCE) vulnerability. This vulnerability arises from insufficient validation of the file names provided by users during the file upload operation at the /pic/upload endpoint. The application allows attackers to upload any files with specially designed names, including overwriting existing FreeMarker template files (.ftl). Since the application uses FreeMarker for dynamic page rendering, attackers can inject malicious FreeMarker expressions into the template files, which will then be executed on the server side during subsequent page accesses, resulting in arbitrary code execution.
来源⚠️ https://github.com/bolo-blog/bolo-solo/issues/329
用户
 MaoQiu (UID 94327)
提交2026-01-21 08時34分 (2 月前)
管理2026-02-03 15時04分 (13 days later)
状态已接受
VulDB条目343981 [bolo-blog bolo-solo 直到 2.6.4 FreeMarker Template PicUploadProcessor.java 文件 权限提升]
积分20

Do you know our Splunk app?

Download it now for free!