Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reggie can read any file #1

Open
LvZCh opened this issue Jan 2, 2025 · 0 comments
Open

Reggie can read any file #1

LvZCh opened this issue Jan 2, 2025 · 0 comments

Comments

@LvZCh
Copy link

LvZCh commented Jan 2, 2025

Vulnerability details:
The default upload and download paths for files are set to D:\img\ in src/main/resources/application.yml
image
First, create a new etc directory in the root directory of drive D, which will store the passwd file
image
image
src/main/java/com/itheima/reggie/controller/CommonController.java The download method in the middle does not filter the incoming name parameter, allowing attackers to download any file without logging in
image

GET /common/download?name=/../etc/passwd HTTP/1.1
Host: 192.168.0.102:8080

image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant