Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w5xm-wm6j-f6v5

Опубликовано: 29 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A vulnerability was determined in Bjskzy Zhiyou ERP up to 11.0. Affected is the function uploadStudioFile of the component com.artery.form.services.FormStudioUpdater. This manipulation of the argument filepath causes path traversal. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was determined in Bjskzy Zhiyou ERP up to 11.0. Affected is the function uploadStudioFile of the component com.artery.form.services.FormStudioUpdater. This manipulation of the argument filepath causes path traversal. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 34%
0.00136
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 6.3
nvd
4 месяца назад

A vulnerability was determined in Bjskzy Zhiyou ERP up to 11.0. Affected is the function uploadStudioFile of the component com.artery.form.services.FormStudioUpdater. This manipulation of the argument filepath causes path traversal. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 34%
0.00136
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-22