Description
Longjing Technology BEMS API versions up to and including 1.21 contains an unauthenticated arbitrary file download vulnerability in the 'downloads' endpoint. The 'fileName' parameter is not properly sanitized, allowing attackers to craft traversal sequences and access sensitive files outside the intended directory.
Problem types
CWE-552 Files or Directories Accessible to External Parties
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version
Timeline
| 2021-07-27: | ZSL-2021-5657 is publicly disclosed. |
Credits
Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5657.php
www.exploit-db.com/exploits/50163
packetstormsecurity.com/files/163702
cxsecurity.com/issue/WLB-2021070173
exchange.xforce.ibmcloud.com/vulnerabilities/206477
web.archive.org/web/20220527162453/http://www.ljkj2012.com/
www.vulncheck.com/...bems-api-remote-arbitrary-file-download