
Cloud Vulnerability DB
A community-led vulnerabilities database
An arbitrary file upload vulnerability was discovered in Mindoc v2.1-beta.5 (CVE-2022-29637). The vulnerability allows attackers to execute arbitrary commands via a crafted Zip file. The issue was disclosed on April 24, 2022 (GitHub Issue).
The vulnerability exists in the project import functionality of Mindoc. When importing a project through the admin interface, the application fails to properly validate uploaded ZIP files. Specifically, the issue is present in the file /utils/ziptil/ziptil.go which does not properly sanitize file paths within ZIP archives, allowing directory traversal attacks using '../' sequences in filenames (GitHub Issue).
An attacker can exploit this vulnerability to write files to arbitrary locations on the server filesystem. If the attacker uploads files to sensitive locations like scheduled task folders on Linux systems, they can achieve arbitrary command execution on the affected server (GitHub Issue).
No official patch or mitigation was published at the time of disclosure. Organizations running affected versions should consider implementing additional validation of uploaded ZIP files and restricting admin interface access until a fix is available.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."