Path Traversal in kalcaddle/kodexplorer
Valid
Reported on
Jun 13th 2021
✍️ Description
KodExplorer A web-based file manager, web IDE/browser-based code editor. I discovered that by uploading a symbolic linked file via any user, he/she could see any file in the server which causes Path Traversal vulnerability.
🕵️♂️ Proof of Concept
- Create a file by the following command
ln -s /etc/passwd test
- Upload that file from any user.
- Open and view the file, you can see the system passwd file.
💥 Impact
Any user can view any system file via symlink files.
Recommendation
unlink the files during file upload.
Occurrences
When the soft connection file is uploaded, the real file has already been uploaded
Thank you for the fix Can you please have a look on this one also https://www.huntr.dev/bounties/11-kalcaddle/KodExplorer/
to join this conversation