Home

Description

LiveBOS, an object-oriented business architecture middleware suite developed by Apex Software Co., Ltd., contains an arbitrary file upload vulnerability in its UploadFile.do;.js.jsp endpoint. This flaw affects the LiveBOS Server component and allows unauthenticated remote attackers to upload crafted files outside the intended directory structure via path traversal in the filename parameter. Successful exploitation may lead to remote code execution on the server, enabling full system compromise. The vulnerability is presumed to affect builds released prior to August 2024 and is said to be remediated in newer versions of the product, though the exact affected range remains undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-08-23 UTC.

PUBLISHED Reserved 2025-08-25 | Published 2025-08-27 | Updated 2025-08-28 | Assigner VulnCheck




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

*
affected

Credits

Sunuomu Security Team finder

References

cn-sec.com/archives/3041179.html technical-description exploit

axsec.blog.csdn.net/article/details/140847466 technical-description exploit

github.com/....do接口文件上传漏洞(XVE-2023-21708).md exploit

blog.csdn.net/weixin_53009585/article/details/140853891 technical-description exploit

blog.csdn.net/jingke666/article/details/140855251 technical-description exploit

www.apexsoft.com.cn/platform/index.html product

www.vulncheck.com/...ivebos-uploadfile-arbitrary-file-upload third-party-advisory

cve.org (CVE-2024-13981)

nvd.nist.gov (CVE-2024-13981)

Download JSON