Логотип exploitDog
bind:CVE-2023-4760
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-4760

Количество 3

Количество 3

nvd логотип

CVE-2023-4760

больше 2 лет назад

In Eclipse RAP versions from 3.0.0 up to and including 3.25.0, Remote Code Execution is possible on Windows when using the FileUpload component. The reason for this is a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName(String name) method. As soon as this finds a / in the path, everything before it is removed, but potentially \ (backslashes) coming further back are kept. For example, a file name such as /..\..\webapps\shell.war can be used to upload a file to a Tomcat server under Windows, which is then saved as ..\..\webapps\shell.war in its webapps directory and can then be executed.

CVSS3: 7.6
EPSS: Низкий
github логотип

GHSA-7ch5-jhg9-j5p5

больше 2 лет назад

In Eclipse RAP versions from 3.0.0 up to and including 3.25.0, Remote Code Execution is possible on Windows when using the FileUpload component. The reason for this is a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName(String name) method. As soon as this finds a / in the path, everything before it is removed, but potentially \ (backslashes) coming further back are kept. For example, a file name such as /..\..\webapps\shell.war can be used to upload a file to a Tomcat server under Windows, which is then saved as ..\..\webapps\shell.war in its webapps directory and can then be executed.

CVSS3: 7.6
EPSS: Низкий
fstec логотип

BDU:2023-07255

больше 2 лет назад

Уязвимость метода FileUploadProcessor.stripFileName(String name) набора плагинов Eclipse Rich Client Platform (RCP), позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-4760

In Eclipse RAP versions from 3.0.0 up to and including 3.25.0, Remote Code Execution is possible on Windows when using the FileUpload component. The reason for this is a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName(String name) method. As soon as this finds a / in the path, everything before it is removed, but potentially \ (backslashes) coming further back are kept. For example, a file name such as /..\..\webapps\shell.war can be used to upload a file to a Tomcat server under Windows, which is then saved as ..\..\webapps\shell.war in its webapps directory and can then be executed.

CVSS3: 7.6
0%
Низкий
больше 2 лет назад
github логотип
GHSA-7ch5-jhg9-j5p5

In Eclipse RAP versions from 3.0.0 up to and including 3.25.0, Remote Code Execution is possible on Windows when using the FileUpload component. The reason for this is a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName(String name) method. As soon as this finds a / in the path, everything before it is removed, but potentially \ (backslashes) coming further back are kept. For example, a file name such as /..\..\webapps\shell.war can be used to upload a file to a Tomcat server under Windows, which is then saved as ..\..\webapps\shell.war in its webapps directory and can then be executed.

CVSS3: 7.6
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-07255

Уязвимость метода FileUploadProcessor.stripFileName(String name) набора плагинов Eclipse Rich Client Platform (RCP), позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу