Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
eGovFramework <= 4.3.1 Unauthenticated File Upload via Web Editor Image Upload Endpoints
Vulnerability Description
eGovFramework/egovframe-common-components versions up to and including 4.3.1 contain an unauthenticated file upload vulnerability via the /utl/wed/insertImage.do and /utl/wed/insertImageCk.do image upload endpoints. These controllers accept multipart requests without authentication, pass the uploaded content to a shared upload helper, and store the file on the server under a framework-controlled path. The framework then returns a download URL that can be used to retrieve the uploaded content, including an attacker-controlled Content-Type within the limits of the image upload functionality. While a filename extension whitelist is enforced, the attacker fully controls the file contents. The response MIME type used is also attacker-controlled when the file is served up to version < 4.1.2. Since version 4.1.2, it is possible to download any image uploaded with any whitelisted content type. But any file uploaded other than an image will be served with the `application/octet-stream` content type (the content type is no longer controlled by the attacker since version 4.1.2). This enables an unauthenticated attacker to use any affected application as a persistent file hosting service for arbitrary content under the application's origin. KISA/KrCERT has identified this unpatched vulnerability as "KVE-2023-5280."
CVSS Information
N/A
Vulnerability Type
危险类型文件的不加限制上传
Vulnerability Title
egovframe-common-components 安全漏洞
Vulnerability Description
egovframe-common-components是e-Government Standard Framework Center开源的一个常用函数集合。 egovframe-common-components 4.3.1及之前版本存在安全漏洞,该漏洞源于未经验证的文件上传端点,可能导致任意文件上传。
CVSS Information
N/A
Vulnerability Type
N/A