You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When processing the upload request method, the IMG_NAME("imgName") in the data body was directly obtained for splicing, resulting in an arbitrary file writing vulnerability
The important fields are that imgName is the destination filename on the server
The content of the file is controlled by fileUploadFile where bytes is the encoded data of base64, starPos, endPos are the start position and end position respectively
The server uses netty to start the server, and then processes messages in ServerHandler#channelRead
Use fastjson to parse json data, and distinguish different request methods through CLIENT_METHOD("method") in the data
com.luckyframe.common.netty.ServerHandler#channelRead
When processing the upload request method, the IMG_NAME("imgName") in the data body was directly obtained for splicing, resulting in an arbitrary file writing vulnerability
com.luckyframe.common.netty.ServerHandler#channelRead
The important fields are that imgName is the destination filename on the server
The content of the file is controlled by fileUploadFile where bytes is the encoded data of base64, starPos, endPos are the start position and end position respectively
Scripting with Python
uploaded successfully
The text was updated successfully, but these errors were encountered: