### [CVE-2023-1800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1800) ![](https://img.shields.io/static/v1?label=Product&message=go-fastdfs&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%201.4.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-24%20Path%20Traversal%3A%20'..%2Ffiledir'&color=brighgreen) ### Description A vulnerability, which was classified as critical, has been found in sjqzhang go-fastdfs up to 1.4.3. Affected by this issue is the function upload of the file /group1/uploa of the component File Upload Handler. The manipulation leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224768. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/ARPSyndicate/cvemon - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Threekiii/Awesome-POC - https://github.com/d4n-sec/d4n-sec.github.io