A vulnerability was found in PandaXGO PandaX up to 20240310 and classified as critical. This issue affects the function ExportUser of the file /apps/system/api/user.go. The manipulation of the argument filename leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257063.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "../" sequences that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://vuldb.com/?id.257063 | vdb entry permissions required technical description |
https://vuldb.com/?ctiid.257063 | signature permissions required |
https://github.com/PandaXGO/PandaX/issues/6 | issue tracking exploit |