提交 #561794: xiaowei1118 java_server master branch Path Traversal信息

标题xiaowei1118 java_server master branch Path Traversal
描述In the java_server project, the file upload API /service/uploadDetailImage contains the following issue: Files are deleted through path concatenation without effectively validating the external parameters used in the path. The code processes "/" path separators, but on Windows systems, it is possible to bypass this by using "\" separators, allowing arbitrary file deletion. Project Link: https://github.com/xiaowei1118/java_server Affected Version: master branch Affected API: /service/uploadDetailImage Code Location: java_server-master/src/main/java/com/changyu/foryou/controller/FoodController.java:1244
来源⚠️ https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md
用户
 ShenxiuSecurity (UID 84374)
提交2025-04-18 08時22分 (1 年前)
管理2025-05-01 14時39分 (13 days later)
状态已接受
VulDB条目306797 [xiaowei1118 java_server 直到 11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a 于 Windows File Upload API FoodController.java 目录遍历]
积分20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!