This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A Path Traversal vulnerability in Jiangnan Online Judge (JNOJ). π **Consequences**: Attackers can access files outside the restricted directory, potentially exposing sensitive system data or source code.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Improper input validation. The system fails to filter special elements in file paths. π **CWE**: Implicitly related to CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).
π» **Capabilities**: Local File Inclusion (LFI). π **Impact**: Read arbitrary files from the server. β οΈ **Risk**: Expose configuration files, source code, or sensitive user data located outside the web root.
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: Low. π **Access**: Likely requires no authentication for the specific endpoint `/web/polygon/problem/viewfile`.β¦
π **Exploit**: Yes. Public PoC available via Nuclei templates. π **Payload Example**: `web/polygon/problem/viewfile?id=1&name=../.` π **Status**: Template exists in projectdiscovery/nuclei-templates.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for the endpoint `/web/polygon/problem/viewfile`. π§ͺ **Test**: Inject `../` in the `name` parameter. π **Indicator**: If the server returns content from outside the expected directory, it is vulnerable.
Q8Is it fixed officially? (Patch/Mitigation)
π§ **Fix**: Upgrade to a patched version (if available). π **Published**: Oct 13, 2019. π **Note**: The data does not specify a fixed version number, only the vulnerable one (0.8.0).
Q9What if no patch? (Workaround)
π« **Workaround**: Restrict web server access to the `/web/polygon/problem/` directory. π **Mitigation**: Implement strict allow-listing for file names and block `../` sequences at the WAF or application level.
Q10Is it urgent? (Priority Suggestion)
β‘ **Priority**: Medium-High. π **CVSS**: Not provided, but LFI is critical. π¨ **Action**: Immediate verification required for any running JNOJ 0.8.0 instances. Patch or isolate immediately.