Oliver Library Server v5 contains a file download vulnerability that allows unauthenticated attackers to access arbitrary system files through unsanitized input in the FileServlet endpoint. Attackers can exploit the vulnerability by manipulating the 'fileName' parameter to download sensitive files from the server's filesystem.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/50599 | Exploit Third Party Advisory |
| https://www.softlinkint.com/product/oliver/ | Product |
| https://www.exploit-db.com/exploits/50599 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-15 16:16
Updated : 2026-01-26 16:15
NVD link : CVE-2021-47755
Mitre link : CVE-2021-47755
CVE.ORG link : CVE-2021-47755
JSON object : View
Products Affected
softlinkint
- oliver_v5_library
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
