关键信息 漏洞类型 Path Traversal Arbitrary File Write Potential Code Execution CVSS Base Metrics Severity: Critical (9.3/10) Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Attack Requirements: None - Privileges Required: None - User interaction: Active Vulnerable System Impact Metrics: - Confidentiality: High - Integrity: High - Availability: High Subsequent System Impact Metrics: - Confidentiality: High - Integrity: High - Availability: High Affected Versions Affected: < 9.2.1 Patched: 9.3.0 Vulnerable Components Vulnerable Code (Lines 89, 159-165) (Lines 67-68) Attack Flow 1. Malicious PDB file contains image records with traversal paths (e.g., ) in the 32-byte name field and batch script content in the data field. 2. reads the 32-byte name from binary data — no sanitization, no extension check. 3. enters subdirectory via . 4. resolves traversal, writes outside directory. 5. Attacker-controlled content is written to the traversed path, overwriting any existing file. Proof of Concept (PoC) Confirmed files written (not ) — no extension restriction. Batch script content written (not image data) — no content validation. Existing files silently overwritten on repeat conversion.