Home

Description

Oliver Library Server v5 contains a file download vulnerability that allows unauthenticated attackers to access arbitrary system files through unsanitized input in the FileServlet endpoint. Attackers can exploit the vulnerability by manipulating the 'fileName' parameter to download sensitive files from the server's filesystem.

PUBLISHED Reserved 2026-01-10 | Published 2026-01-15 | Updated 2026-01-26 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 8.00.008.053
affected

Credits

Mandeep Singh, Ishaan Vij, Luke Blues, CTRL Group finder

References

www.exploit-db.com/exploits/50599 exploit

www.exploit-db.com/exploits/50599 (ExploitDB-50599) exploit

www.softlinkint.com/product/oliver/ (Oliver Library Server Official Product Homepage) product

cve.org (CVE-2021-47755)

nvd.nist.gov (CVE-2021-47755)

Download JSON