提交 #579088: MTA Maita Training System v4.5 Arbitrary File Upload Vulnerability信息

标题MTA Maita Training System v4.5 Arbitrary File Upload Vulnerability
描述1.Vulnerability name: Arbitrary File Upload Vulnerability for MTA Maita Training System 2.Vulnerability level: High risk 3.Bug submitter and contributor: caichaoxiong 4.Vulnerability affected version : v4.5 5.Vulnerability Description: MTA Maita training system v4.5, when the upload.type in the configuration file of the application system is local, there is a security defect in the background application system when processing directory traversal, there is an arbitrary file upload vulnerability, and there is an arbitrary file download vulnerability, which can lead to the leakage of background service data files, or the upload of Webshell leading to the control of the server and other serious consequences. 6. Vulnerability fix: The arbitrary file upload vulnerability needs to focus on type verification, path isolation, and content security . The arbitrary download vulnerability needs to strengthen input filtering, permission control, and storage isolation. Both need to be combined with comprehensive repair measures such as whitelist mechanism, server reinforcement, and log monitoring.
来源⚠️ https://wx.mail.qq.com/s?k=o3X5wV0ZZH0nuusQdO
用户
 caichaoxiong (UID 84060)
提交2025-05-16 10時30分 (11 月前)
管理2025-05-25 15時24分 (9 days later)
状态已接受
VulDB条目310259 [llisoft MTA Maita Training System 4.5 OpenController.java this.fileService.download url 权限提升]
积分17

Do you know our Splunk app?

Download it now for free!