Description
A security vulnerability has been detected in moxi159753 Mogu Blog v2 up to 5.2. The impacted element is the function FileOperation.unzip of the file /networkDisk/unzipFile of the component ZIP File Handler. Such manipulation of the argument fileUrl leads to path traversal. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
5.1
5.2
Timeline
| 2025-11-30: | Advisory disclosed |
| 2025-11-30: | VulDB entry created |
| 2025-11-30: | VulDB entry last update |
Credits
sh7err05 (VulDB User)
References
vuldb.com/?id.333825 (VDB-333825 | moxi159753 Mogu Blog v2 ZIP File unzipFile FileOperation.unzip path traversal)
vuldb.com/?ctiid.333825 (VDB-333825 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.692107 (Submit #692107 | moxi159753 mogu_blog_v2 <=v5.2 Path Traversal / Zip Slip)
github.com/...ain/archives/mogu_blog_v2-zip_slip-1/report.md
github.com/...ain/archives/mogu_blog_v2-zip_slip-1/report.md