An Archive Extraction (AKA "Zip Slip) vulnerability exists in bbs 5.3 in the UpgradeNow function in UpgradeManageAction.java, which unzips the arbitrary upladed zip file without checking filenames. The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe).
References
Link | Resource |
---|---|
https://github.com/diyhi/bbs/issues/51 | Exploit Third Party Advisory |
https://github.com/diyhi/bbs/issues/51 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/diyhi/bbs/issues/51 - Exploit, Third Party Advisory |
Information
Published : 2022-03-28 22:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-43099
Mitre link : CVE-2021-43099
CVE.ORG link : CVE-2021-43099
JSON object : View
Products Affected
diyhi
- bbs
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')