Description
util/FileDownloadUtils.java in FileDownloader 1.7.3 does not check an attachment's name. If an attacker places "../" in the file name, the file can be stored in an unintended directory because of Directory Traversal.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-3288 | util/FileDownloadUtils.java in FileDownloader 1.7.3 does not check an attachment's name. If an attacker places "../" in the file name, the file can be stored in an unintended directory because of Directory Traversal. |
References
| Link | Providers |
|---|---|
| https://github.com/lingochamp/FileDownloader/issues/1028 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T08:01:52.872Z
Reserved: 2018-05-18T00:00:00.000Z
Link: CVE-2018-11248
No data.
Status : Modified
Published: 2018-05-18T18:29:00.327
Modified: 2024-11-21T03:42:59.557
Link: CVE-2018-11248
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD