Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Remote Code Execution in Eclipse RAP on Windows
Vulnerability Description
In Eclipse RAP versions from 3.0.0 up to and including 3.25.0, Remote Code Execution is possible on Windows when using the FileUpload component. The reason for this is a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName(String name) method. As soon as this finds a / in the path, everything before it is removed, but potentially \ (backslashes) coming further back are kept. For example, a file name such as /..\..\webapps\shell.war can be used to upload a file to a Tomcat server under Windows, which is then saved as ..\..\webapps\shell.war in its webapps directory and can then be executed.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Eclipse RAP 路径遍历漏洞
Vulnerability Description
Eclipse RAP是Eclipse基金会的一个开源软件项目,旨在使软件开发人员能够使用Eclipse开发模型,插件和仅Java应用程序编程接口来构建支持Ajax的富Internet应用程序。 Eclipse RAP 3.25.0 版本之前的 3.0 版本存在安全漏洞,该漏洞源于使用 FileUpload 组件时可以在 Windows 上执行远程代码。
CVSS Information
N/A
Vulnerability Type
N/A