CVE-2023-4760

In Eclipse RAP versions from 3.0.0 up to and including 3.25.0, Remote Code Execution is possible on Windows when using the FileUpload component. The reason for this is a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName(String name) method. As soon as this finds a / in the path, everything before it is removed, but potentially \ (backslashes) coming further back are kept. For example, a file name such as /..\..\webapps\shell.war can be used to upload a file to a Tomcat server under Windows, which is then saved as ..\..\webapps\shell.war in its webapps directory and can then be executed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:remote_application_platform:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:35

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-21 08:15

Updated : 2024-11-21 08:35


NVD link : CVE-2023-4760

Mitre link : CVE-2023-4760

CVE.ORG link : CVE-2023-4760


JSON object : View

Products Affected

eclipse

  • remote_application_platform
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal