漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
JSC R7 R7-Office Document Server downloadas path traversal
Vulnerability Description
A flaw has been found in JSC R7 R7-Office Document Server up to 20250820. Impacted is an unknown function of the file /downloadas/. Executing manipulation of the argument cmd can lead to path traversal. The attack can be launched remotely. Upgrading to version 2025.3.1.923 is recommended to address this issue. The affected component should be upgraded. R7-Office is a fork of OpenOffice and at the moment it remains unclear if OpenOffice is affected as well. The OpenOffice team was not able to reproduce the issue in their codebase. The vendor replied: "We confirm that this vulnerability has been verified and patched in release 2025.3.1.923. During our security testing, it was not possible to exploit the issue - the server consistently returns proper error responses to the provided scenarios."
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
JSC R7 R7-Office Document Server 路径遍历漏洞
Vulnerability Description
JSC R7 R7-Office Document Server是俄罗斯JSC R7公司的一款办公软件。 JSC R7 R7-Office Document Server 20250820及之前版本存在路径遍历漏洞,该漏洞源于对文件/downloadas/中参数cmd的错误操作,可能导致路径遍历攻击。
CVSS Information
N/A
Vulnerability Type
N/A