A vulnerability classified as critical has been found in 1902756969 reggie 1.0. Affected is the function download of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
History

Tue, 21 Oct 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared 1902756969
1902756969 reggie
CPEs cpe:2.3:a:1902756969:reggie:1.0:*:*:*:*:*:*:*
Vendors & Products 1902756969
1902756969 reggie

Mon, 13 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 12 Jan 2025 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability classified as critical has been found in 1902756969 reggie 1.0. Affected is the function download of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title 1902756969 reggie CommonController.java download path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-01-12T23:31:05.284Z

Updated: 2025-01-13T15:10:03.433Z

Reserved: 2025-01-12T09:51:17.669Z

Link: CVE-2025-0401

cve-icon Vulnrichment

Updated: 2025-01-13T15:09:58.554Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-13T00:15:06.807

Modified: 2025-10-21T11:43:22.537

Link: CVE-2025-0401

cve-icon Redhat

No data.