A vulnerability was found in yanyutao0402 ChanCMS up to 3.1.2. It has been rated as critical. Affected by this issue is the function delfile of the file app/extend/utils.js. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. The name of the patch is c8a282bf02a62b59ec60b4699e91c51aff2ee9cd. It is recommended to upgrade the affected component.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://vuldb.com/?id.317528 | technical description vdb entry third party advisory |
https://vuldb.com/?ctiid.317528 | permissions required vdb entry signature |
https://vuldb.com/?submit.619776 | vdb entry third party advisory |
https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8 | issue tracking exploit |
https://gitee.com/yanyutao0402/ChanCMS/issues/ICLOT8#note_43945209_link | issue tracking exploit |
https://gitee.com/yanyutao0402/ChanCMS/commit/c8a282bf02a62b59ec60b4699e91c51aff2ee9cd | patch permissions required |
https://gitee.com/yanyutao0402/ChanCMS/releases/tag/V3.1.3 | release notes patch |