Description
A security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function createResponseEntity of the file warehouse\src\main\java\com\yeqifu\sys\common\AppFileUtils.java. The manipulation of the argument path results in path traversal. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
Problem types
Product status
Timeline
| 2026-01-02: | Advisory disclosed |
| 2026-01-02: | VulDB entry created |
| 2026-01-02: | VulDB entry last update |
Credits
5i1encee (VulDB User)
References
github.com/...d Vulnerability in Project yeqifu warehouse.md
vuldb.com/?id.339385 (VDB-339385 | yeqifu warehouse AppFileUtils.java createResponseEntity path traversal)
vuldb.com/?ctiid.339385 (VDB-339385 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.729331 (Submit #729331 | yeqifu warehouse aaf29962ba407d22d991781de28796ee7b4670e4 Arbitrary File Read)
github.com/...d Vulnerability in Project yeqifu warehouse.md
github.com/...d Vulnerability in Project yeqifu warehouse.md
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.