We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-6108

hansonwang99 Spring-Boot-In-Action File Upload ImageUploadService.java watermarkTest path traversal



Description

EN DE

A vulnerability was found in hansonwang99 Spring-Boot-In-Action up to 807fd37643aa774b94fd004cc3adbd29ca17e9aa. It has been declared as critical. Affected by this vulnerability is the function watermarkTest of the file /springbt_watermark/src/main/java/cn/codesheep/springbt_watermark/service/ImageUploadService.java of the component File Upload. The manipulation of the argument filename leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

In hansonwang99 Spring-Boot-In-Action bis 807fd37643aa774b94fd004cc3adbd29ca17e9aa wurde eine kritische Schwachstelle ausgemacht. Betroffen ist die Funktion watermarkTest der Datei /springbt_watermark/src/main/java/cn/codesheep/springbt_watermark/service/ImageUploadService.java der Komponente File Upload. Dank Manipulation des Arguments filename mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. Dieses Produkt setzt Rolling Releases ein. Aus diesem Grund sind Details zu betroffenen oder zu aktualisierende Versionen nicht verfügbar.

Reserved 2025-06-15 | Published 2025-06-16 | Updated 2025-06-16 | Assigner VulDB


MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Path Traversal

Product status

807fd37643aa774b94fd004cc3adbd29ca17e9aa
affected

Timeline

2025-06-15:Advisory disclosed
2025-06-15:VulDB entry created
2025-06-15:VulDB entry last update

Credits

ShenxiuSecurity (VulDB User) reporter

References

vuldb.com/?id.312577 (VDB-312577 | hansonwang99 Spring-Boot-In-Action File Upload ImageUploadService.java watermarkTest path traversal) vdb-entry technical-description

vuldb.com/?ctiid.312577 (VDB-312577 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.592362 (Submit #592362 | hansonwang99 Spring-Boot-In-Action master branch Path Traversal) third-party-advisory

github.com/...xiuSec/cve-proofs/blob/main/POC-20250607-01.md exploit

cve.org (CVE-2025-6108)

nvd.nist.gov (CVE-2025-6108)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-6108

Support options

Helpdesk Chat, Email, Knowledgebase