目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-44522— Note Mark 资产名路径遍历致远程代码执行漏洞

AI 预测 7.5 利用难度: 较易 EPSS 0.77% · P74

影响版本矩阵 1

厂商产品版本范围状态
enchant97note-mark>= 0.13.0, < 0.19.4affected
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-44522 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Note Mark: Arbitrary File Write via Path Traversal in Asset Names Leading to Remote Code Execution
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Note Mark is an open-source note-taking application. From 0.13.0 to before 0.19.4, the Note Mark application allows authenticated users to upload assets to notes via POST /api/notes/{noteID}/assets, where the asset filename is provided through the X-Name HTTP request header. This value is stored directly in the database without any sanitization or validation - no path separator filtering, no directory traversal sequence rejection, and no use of filepath.Base() to strip directory components. The unsanitized name is persisted as-is in the note_assets table (Name column, varchar(80)). When an administrator subsequently runs the data export CLI commands (note-mark migrate export-v1 or note-mark migrate export), the stored asset name is passed directly into filepath.Join() and path.Join() calls as part of the output file path argument to os.Create(). Since Go's filepath.Join() resolves ../ sequences during path normalization, an attacker-controlled asset name containing directory traversal sequences causes the export process to write files to arbitrary locations on the filesystem, completely outside the intended export directory. This vulnerability is fixed in 0.19.4.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
输入验证不恰当
来源: 美国国家漏洞数据库 NVD

受影响产品

厂商产品影响版本CPE订阅
enchant97note-mark >= 0.13.0, < 0.19.4 -

二、漏洞 CVE-2026-44522 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-44522 的情报信息

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-44522

暂无评论


发表评论