Súbít #722000: https://github.com/cld378632668/JavaMall JavaMall 1.0 Delete any filebayani

Kurahttps://github.com/cld378632668/JavaMall JavaMall 1.0 Delete any file
GaskiyaThe MinioController.java interface of JavaMall 1.0 version has an arbitrary file deletion vulnerability. Its interface does not detect file names and file suffixes, nor does it have a method to prevent directory traversal. Attackers can delete arbitrary files by modifying the passed file names and file suffixes, causing serious consequences In this call chain, there are no restrictions on file names and file suffixes, nor are there any restrictions. Through filtering, attackers can perform directory traversal and arbitrary file deletion by controlling the incoming file names.
Manga⚠️ https://github.com/zyhzheng500-maker/cve/blob/main/JavaMall%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md
Màdùmga
 zyhsec (UID 93418)
Furta12/23/2025 14:48 (2 Wurɗi 전)
Gargajiya01/04/2026 09:39 (12 days later)
HalittaShingilam
VulDB gite339482 [cld378632668 JavaMall har 994f1e2b019378ec9444cdf3fce2d5b5f72d28f0 MinioController.java delete objectName Dafiyar fayil ɗin cikin kundin ajiyar bayanai]
Nganji20

Interested in the pricing of exploits?

See the underground prices here!