Impact
The vulnerability resides in the upload3.jsp page of Metasoft 美特软件 MetaCRM and allows an attacker to upload any file type because the File argument is not validated. The flaw exposes a classic unrestricted upload weakness that can be abused to place executable or malicious content on the server. The damage ranges from file system contamination to potential execution of scripts if placed in a web-accessible directory, thereby threatening confidentiality and integrity of the application.
Affected Systems
All installations of Metasoft 美特软件 MetaCRM up to and including version 6.4.0 Beta06 are affected. The specific endpoint, /common/jsp/upload3.jsp, is responsible for handling file uploads and is the target of the exploit. No later versions were mentioned as unaffected in the provided data.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, and the EPSS score is not available, suggesting limited data on recent exploit activity. The vulnerability is not listed in CISA KEV, but it has been publicly disclosed and is acknowledged as exploitable. Attackers can launch the exploit remotely by sending a crafted request to the upload3.jsp endpoint, thereby achieving unrestricted uploads without user interaction.
OpenCVE Enrichment