The vulnerability was identified in the web service for a chunked file upload. While the names of the POST parameters vary with the used frontend, their values are always used in the same way to build a path where the chunks are stored and assembled temporarily. By not validating these parameters properly, OneupUploaderBundle is susceptible to a path traversal vulnerability which can be exploited to upload files to arbitrary folders on the filesystem. The assembly process can further be misused with some restrictions to delete and copy files to other locations.
The vulnerability can be exploited by any users that have legitimate access to the upload functionality and can lead to arbitrary code execution, denial of service and disclosure of confidential information.
Yes, see version 1.9.3 and 2.1.5.
https://owasp.org/www-community/attacks/Path_Traversal
This security vulnerability was found by Thibaud Kehler of SySS GmbH. E-Mail: thibaud.kehler@syss.de
{ "nvd_published_at": "2020-02-05T14:15:00Z", "cwe_ids": [ "CWE-22", "CWE-23" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-02-05T13:52:02Z" }