Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-43662 PoC — ShokoServer 路径遍历漏洞

Source
Associated Vulnerability
Title:ShokoServer 路径遍历漏洞 (CVE-2023-43662)
Description:ShokoServer是一个动漫收藏管理平台。 ShokoServer 存在路径遍历漏洞,该漏洞源于没有对参数进行清洗。攻击者利用该漏洞可以读取任意文件。
Description
ShokoServer is a media server which specializes in organizing anime. In affected versions the `/api/Image/WithPath` endpoint is accessible without authentication and is supposed to return default server images. The endpoint accepts the parameter `serverImagePath`, which is not sanitized in any way before being passed to `System.IO.File.OpenRead`, which results in an arbitrary file read.
File Snapshot

id: CVE-2023-43662 info: name: ShokoServer System - Local File Inclusion (LFI) author: pussycat ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.