Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5g4f-pj2h-5mvx

Опубликовано: 28 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 10

Описание

QiAnXin TianQing Management Center versions up to and including 6.7.0.4130 contain a path traversal vulnerability in the rptsvr component that allows unauthenticated attackers to upload files to arbitrary locations on the server. The /rptsvr/upload endpoint fails to sanitize the filename parameter in multipart form-data requests, enabling path traversal. This allows attackers to place executable files in web-accessible directories, potentially leading to remote code execution.

QiAnXin TianQing Management Center versions up to and including 6.7.0.4130 contain a path traversal vulnerability in the rptsvr component that allows unauthenticated attackers to upload files to arbitrary locations on the server. The /rptsvr/upload endpoint fails to sanitize the filename parameter in multipart form-data requests, enabling path traversal. This allows attackers to place executable files in web-accessible directories, potentially leading to remote code execution.

EPSS

Процентиль: 73%
0.00791
Низкий

10 Critical

CVSS4

Дефекты

CWE-22

Связанные уязвимости

nvd
5 месяцев назад

QiAnXin TianQing Management Center versions up to and including 6.7.0.4130 contain a path traversal vulnerability in the rptsvr component that allows unauthenticated attackers to upload files to arbitrary locations on the server. The /rptsvr/upload endpoint fails to sanitize the filename parameter in multipart form-data requests, enabling path traversal. This allows attackers to place executable files in web-accessible directories, potentially leading to remote code execution. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-08-23 UTC.

EPSS

Процентиль: 73%
0.00791
Низкий

10 Critical

CVSS4

Дефекты

CWE-22