cve/2023/CVE-2023-1800.md

22 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-1800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1800)
![](https://img.shields.io/static/v1?label=Product&message=go-fastdfs&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.4.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-24%20Path%20Traversal%3A%20'..%2Ffiledir'&color=brighgreen)
### Description
A vulnerability, which was classified as critical, has been found in sjqzhang go-fastdfs up to 1.4.3. Affected by this issue is the function upload of the file /group1/uploa of the component File Upload Handler. The manipulation leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224768.
### POC
#### Reference
No PoCs from references.
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/0day404/vulnerability-poc
2024-05-25 21:48:12 +02:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Threekiii/Awesome-POC
- https://github.com/d4n-sec/d4n-sec.github.io