QiAnXin TianQing Management Center versions up to and including 6.7.0.4130 contain a path traversal vulnerability in the rptsvr component that allows unauthenticated attackers to upload files to arbitrary locations on the server. The /rptsvr/upload endpoint fails to sanitize the filename parameter in multipart form-data requests, enabling path traversal. This allows attackers to place executable files in web-accessible directories, potentially leading to remote code execution. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-08-23 UTC.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://cn-sec.com/archives/2421288.html | technical description exploit |
https://blog.csdn.net/maxiluo/article/details/135865584 | technical description exploit |
https://www.qianxin.com/product/detail/pid/330 | product |
https://www.vulncheck.com/advisories/qianxin-tianqing-management-center-arbitrary-file-upload | third party advisory |