A vulnerability, which was classified as critical, has been found in sjqzhang go-fastdfs up to 1.4.3. Affected by this issue is the function upload of the file /group1/uploa of the component File Upload Handler. The manipulation leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224768.
References
Link | Resource |
---|---|
https://github.com/yangyanglo/ForCVE/blob/main/2023-0x05.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.224768 | Third Party Advisory |
https://vuldb.com/?id.224768 | Third Party Advisory |
https://github.com/yangyanglo/ForCVE/blob/main/2023-0x05.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.224768 | Third Party Advisory |
https://vuldb.com/?id.224768 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yangyanglo/ForCVE/blob/main/2023-0x05.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.224768 - Third Party Advisory | |
References | () https://vuldb.com/?id.224768 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.3 |
Information
Published : 2023-04-02 11:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1800
Mitre link : CVE-2023-1800
CVE.ORG link : CVE-2023-1800
JSON object : View
Products Affected
go-fastdfs_project
- go-fastdfs