漏洞标题
qwdigital链接微信通用下载接口资源路径遍历
漏洞描述信息
在 qwdigital LinkWechat 5.1.0 中发现了一个漏洞。这个漏洞被分类为问题性的,它影响到文件 /linkwechat-api/common/download/resource 组件的 Universal Download Interface 部分。通过在输入 /profile/../../../../../etc/passwd 中修改参数名称,攻击者可以通过路径遍历来突破文件系统:‘../filedir’。这个漏洞可以从远程发起攻击。该漏洞已经公开,并且可能被用于进一步的攻击。此漏洞的标识符是 VDB-252033。注意:这个漏洞披露给了供应商,但他们没有回应任何方式。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
漏洞类别
对路径名的限制不恰当(路径遍历)
漏洞标题
qwdigital LinkWechat Universal Download Interface resource path traversal
漏洞描述信息
A vulnerability was found in qwdigital LinkWechat 5.1.0. It has been classified as problematic. This affects an unknown part of the file /linkwechat-api/common/download/resource of the component Universal Download Interface. The manipulation of the argument name with the input /profile/../../../../../etc/passwd leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252033 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
漏洞类别
路径遍历:’../filedir’
漏洞标题
LinkWeChat 安全漏洞
漏洞描述信息
LinkWeChat是基于企业微信的开源 SCRM 系统。 LinkWeChat 5.1.0版本存在安全漏洞,该漏洞源于文件/linkwechat-api/common/download/resource的参数name会导致路径遍历。
CVSS信息
N/A
漏洞类别
其他