提交 #792336: SonicCloudOrg sonic-server 2.0.0 Injection信息

标题SonicCloudOrg sonic-server 2.0.0 Injection
描述Sonic Server provides file upload functionality through two endpoints: /upload and /upload/v2. Both endpoints accept a type parameter that is intended to specify the upload directory category (e.g., "keepFiles", "imageFiles", "recordFiles", "logFiles", "packageFiles"). However, the application does not enforce any validation on this parameter, allowing an attacker to supply directory traversal sequences such as ../ or ..\\. The vulnerable code in FileTool.java directly concatenates the user-controlled folderName parameter into the file path without sanitization. It then uses mkdirs() to create directories and transferTo() to write files at the attacker-specified location, effectively bypassing any intended directory restrictions.
来源⚠️ https://github.com/ccccccctiiiiiiii-lab/public_exp/issues/2
用户
 cccccccti (UID 96695)
提交2026-03-29 11時24分 (23 日前)
管理2026-04-19 18時23分 (21 days later)
状态已接受
VulDB条目358255 [SonicCloudOrg sonic-server 直到 2.0.0 File Upload Endpoint FileTool.java upload 类型 目录遍历]
积分20

Do you need the next level of professionalism?

Upgrade your account now!