Gast Arbeiter allegedly does not sufficiently validate user-supplied input during uploads. This could be exploited by a remote attacker to upload a file to an attacker-specified location on the file system hosting the software. The issue appears to be exploitable by including directory traversal sequences during a file upload. Consequences of exploitation include the possibility of corruption files on the system or placing files such as malicious scripts in directories where they may be interpreted.
Gast Arbeiter allegedly does not sufficiently validate user-supplied input during uploads. This could be exploited by a remote attacker to upload a file to an attacker-specified location on the file system hosting the software. The issue appears to be exploitable by including directory traversal sequences during a file upload. Consequences of exploitation include the possibility of corruption files on the system or placing files such as malicious scripts in directories where they may be interpreted.