漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Microweber CMS Authenticated Local File Inclusion via Backup API
Vulnerability Description
An authenticated local file inclusion vulnerability exists in Microweber CMS versions <= 1.2.11 through misuse of the backup management API. Authenticated users can abuse the /api/BackupV2/upload and /api/BackupV2/download endpoints to read arbitrary files from the underlying filesystem. By specifying an absolute file path in the src parameter of the upload request, the server may relocate or delete the target file depending on the web service user’s privileges. The corresponding download endpoint can then be used to retrieve the file contents, effectively enabling local file disclosure. This behavior stems from insufficient validation of user-supplied paths and inadequate restrictions on file access and backup logic.
CVSS Information
N/A
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Microweber CMS 路径遍历漏洞
Vulnerability Description
Microweber CMS是Microweber开源的一个拖放式网站构建器。 Microweber CMS 1.2.11及之前版本存在路径遍历漏洞,该漏洞源于文件包含问题,可能导致文件读取。
CVSS Information
N/A
Vulnerability Type
N/A