Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-29637: There is a directory traversal vulnerability in mindoc · Issue #788 · mindoc-org/mindoc

An arbitrary file upload vulnerability in Mindoc v2.1-beta.5 allows attackers to execute arbitrary commands via a crafted Zip file.

CVE
#vulnerability#linux#git

请按照一下格式提交issue,谢谢!

  1. 你当前使用的是哪个版本的 MinDoc(godoc_linux_amd64 version)?
    v2.1-beta.5

  2. 你当前使用的是什么操作系统?
    Centos

  3. 你是如何操作的?
    进入后台,我的项目,导入项目,导入恶意zip文件

  4. 你期望得到什么结果?
    在根目录生成RCE!.txt

  5. 当前遇到的是什么结果?
    生成了该文件,没有对zip文件进行过滤,导致可以任意上传文件,如果上传恶意文件到计划任务,则可以导致任意命令执行

[Suggested description]

There is an arbitrary file upload vulnerability in mindoc. Hackers can construct malicious zip files containing “… /” to upload files to any directory. If you upload it to the scheduled task folder of Linux, you can execute any command

[Vulnerability Type]

Directory Traversal

[Vendor of Product]

https://github.com/mindoc-org/mindoc

[Affected Product Code Base]

v2.1-beta.5

[Affected Component]

First, you need to log in to the background and enter “我的项目”

Then use the “导入项目” function

“项目标题” and “项目标识” can be filled in arbitrarily, as long as it meets its basic requirements. Then upload the constructed zip file. What I constructed here is “…/…/…/…/…/…/…/…/RCE!.txt”

test.zip

After clicking upload, he will create a new “RCE!.txt” in the root directory of the server

[Defective code]

/utils/ziptil/ziptil.go

[Discoverer]

Bingan

Related news

GHSA-f7ff-xf87-f22q: Arbitrary command execution in Minidoc

An arbitrary file upload vulnerability in Mindoc v2.1-beta.5 allows attackers to execute arbitrary commands via a crafted Zip file.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907