CVE-2023-1800
02.04.2023, 11:15
A vulnerability, which was classified as critical, has been found in sjqzhang go-fastdfs up to 1.4.3. Affected by this issue is the function upload of the file /group1/uploa of the component File Upload Handler. The manipulation leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224768.Enginsight
Vendor | Product | Version |
---|---|---|
go-fastdfs_project | go-fastdfs | 𝑥 ≤ 1.4.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-24 - Path Traversal: '../filedir'The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "../" sequences that can resolve to a location that is outside of that directory.
- CWE-434 - Unrestricted Upload of File with Dangerous TypeThe software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.