On worst cases, this could even result in remote access/code execution when the user is able to execute commands or shell scripts in remote fashion. Using this attack, An attacker could gain access to certain directories/folders in the file system outside the intended/privileged folder and can invoke/overwrite files.
Attacker can upload the specific zip file to the server, witch makes your application vulnerable to path traversal attack and sensitive data exposure.
Vulnerability url: http://localhost:8080/admin/template/install the flaws happened in this place:
the zip file like this:
On worst cases, this could even result in remote access/code execution when the user is able to execute commands or shell scripts in remote fashion. Using this attack, An attacker could gain access to certain directories/folders in the file system outside the intended/privileged folder and can invoke/overwrite files.