Key Information Summary Vulnerability Overview Vulnerability Type: Arbitrary File Upload Vulnerability Affected System: ShStaticFileAPI Affected Component: function in the method Affected Versions: All versions up to the current development version Vulnerability Details Root Cause: Lack of proper path validation and sanitization during file upload. Technical Analysis: - Attack Source: Malicious paths derived from user-uploaded filenames. - Inadequate Sanitization: The function only replaces without additional sanitization. - Path Construction: Paths are constructed and used directly without path validation. - File Transfer: Uses method without checking path normalization. Vulnerable Code Example Attack Vector Attackers can exploit this vulnerability by uploading files containing path traversal sequences (e.g., ). Impact Remote Code Execution System Compromise Data Leakage Service Disruption Remediation Recommendations Immediate Fix: Implement stricter path validation. Comprehensive Fix: Include path normalization, file extension checks, content validation, and directory validation. References OWASP Guidelines on Dangerous File Uploads CWE-22: Path Traversal CWE-73: External Control of File Name or Path