Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Gin-vue-admin has arbitrary file upload vulnerability caused by path traversal
Vulnerability Description
Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.8.7 has a path traversal vulnerability in the breakpoint resume upload functionality. Attacker can upload any files on any directory. In the breakpoint_continue.go file, the MakeFile function accepts a fileName parameter through the /fileUploadAndDownload/breakpointContinueFinish API endpoint and directly concatenates it with the base directory path (./fileDir/) using os.OpenFile() without any validation for directory traversal sequences (e.g., ../). An attacker with file upload privileges could exploit this vulnerability.
CVSS Information
N/A
Vulnerability Type
危险类型文件的不加限制上传
Vulnerability Title
Gin-vue-admin 代码问题漏洞
Vulnerability Description
Gin-Vue-Admin是flipped-aurora开源的一个基于 Vue 和 Gin 开发的全栈前开发基础平台。 Gin-vue-admin v2.8.7及之前版本存在代码问题漏洞,该漏洞源于断点续传上传功能存在路径遍历,可能导致攻击者在任意目录上传任意文件。
CVSS Information
N/A
Vulnerability Type
N/A