A vulnerability was found in yangzongzhuan RuoYi up to 4.8.1 and classified as critical. This issue affects the function uploadFile of the file ruoyi-admin/src/main/java/com/ruoyi/web/controller/common/CommonController.java. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://vuldb.com/?id.317021 | technical description vdb entry |
https://vuldb.com/?ctiid.317021 | signature permissions required |
https://vuldb.com/?submit.618361 | third party advisory |
https://github.com/yangzongzhuan/RuoYi/issues/296 | exploit issue tracking |