First published: Thu Sep 21 2023(Updated: )
In Eclipse RAP versions from 3.0.0 up to and including 3.25.0, Remote Code Execution is possible on Windows when using the FileUpload component. The reason for this is a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName(String name) method. As soon as this finds a / in the path, everything before it is removed, but potentially \ (backslashes) coming further back are kept. For example, a file name such as /..\..\webapps\shell.war can be used to upload a file to a Tomcat server under Windows, which is then saved as ..\..\webapps\shell.war in its webapps directory and can then be executed.
Credit: emo@eclipse.org emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Remote Application Platform | >=3.0.0<=3.25.0 | |
>=3.0.0<=3.25.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4760 is critical.
CVE-2023-4760 affects Eclipse RAP versions from 3.0.0 up to and including 3.25.0.
Remote Code Execution is possible in CVE-2023-4760 due to a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName() method.
CVE-2023-4760 has CWE IDs 22 and 23.
Yes, you can find references for CVE-2023-4760 at the following links: 1. [https://github.com/eclipse-rap/org.eclipse.rap/pull/141](https://github.com/eclipse-rap/org.eclipse.rap/pull/141) 2. [https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/160](https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/160)