A vulnerability has been found in MigoXLab LMeterX 1.2.0 and classified as critical. Affected by this vulnerability is the function process_cert_files of the file backend/service/upload_service.py. The manipulation of the argument task_id leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is f1b00597e293d09452aabd4fa57f3185207350e8. It is recommended to apply a patch to fix this issue.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://vuldb.com/?id.319225 | technical description vdb entry |
https://vuldb.com/?ctiid.319225 | signature permissions required |
https://vuldb.com/?submit.621741 | third party advisory |
https://github.com/MigoXLab/LMeterX/issues/10 | issue tracking |
https://github.com/MigoXLab/LMeterX/issues/10#issuecomment-3136380379 | issue tracking |
https://github.com/MigoXLab/LMeterX/issues/10#issue-3255375024 | exploit issue tracking |
https://github.com/MigoXLab/LMeterX/commit/f1b00597e293d09452aabd4fa57f3185207350e8 | patch |