We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in kuangstudy KuangSimpleBBS 1.0. It has been declared as critical. Affected by this vulnerability is the function fileUpload of the file src/main/java/com/kuang/controller/QuestionController.java. The manipulation of the argument editormd-image-file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
In kuangstudy KuangSimpleBBS 1.0 wurde eine kritische Schwachstelle ausgemacht. Betroffen ist die Funktion fileUpload der Datei src/main/java/com/kuang/controller/QuestionController.java. Durch die Manipulation des Arguments editormd-image-file mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
2025-04-19: | Advisory disclosed |
2025-04-19: | VulDB entry created |
2025-04-19: | VulDB entry last update |
Caigo (VulDB User)
vuldb.com/?id.305737 (VDB-305737 | kuangstudy KuangSimpleBBS QuestionController.java fileUpload unrestricted upload)
vuldb.com/?ctiid.305737 (VDB-305737 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.556133 (Submit #556133 | https://gitee.com/kuangstudy/kuang_simple_bbs kuang_simple_bbs 1.0 Unrestricted Upload of File with Dangerous Type)
github.com/.../blob/main/KuangSimpeBBS/任意文件上传.md
Support options