Vulnerability Description
Directory Traversal vulnerability in file cn/roothub/store/FileSystemStorageService in function store in Roothub 2.6.0 allows remote attackers with low privlege to arbitrarily upload files via /common/upload API, which could lead to remote arbitrary code execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Roothub | Roothub | 2.6.0 |
Related Weaknesses (CWE)
References
- https://github.com/Hyperkopite/Roothub_vulns/blob/main/arbitrary%20file%20uploadExploitThird Party Advisory
- https://github.com/miansen/Roothub/tree/v2.6Third Party Advisory
- https://github.com/Hyperkopite/Roothub_vulns/blob/main/arbitrary%20file%20uploadExploitThird Party Advisory
- https://github.com/miansen/Roothub/tree/v2.6Third Party Advisory
FAQ
What is CVE-2022-28052?
CVE-2022-28052 is a vulnerability with a CVSS score of 8.0 (HIGH). Directory Traversal vulnerability in file cn/roothub/store/FileSystemStorageService in function store in Roothub 2.6.0 allows remote attackers with low privlege to arbitrarily upload files via /common...
How severe is CVE-2022-28052?
CVE-2022-28052 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-28052?
Check the references section above for vendor advisories and patch information. Affected products include: Roothub Roothub.