A vulnerability, which was classified as problematic, has been found in moxi624 Mogu Blog v2 up to 5.2. This issue affects the function uploadPictureByUrl of the file /mogu-picture/file/uploadPicsByUrl. The manipulation of the argument urlList leads to absolute path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226109 was assigned to this vulnerability.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://vuldb.com/?id.226109 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.226109 | signature third party advisory permissions required |
https://github.com/c3p0ooo-Yiqiyin/mogu_blog_v2/blob/main/README.md | related third party advisory exploit |
https://github.com/moxi624/mogu_blog_v2/issues/97 | third party advisory issue tracking exploit |