Fujian Apex LiveBOS Path Traversal Vulnerability
A path traversal vulnerability exists in Fujian Apex LiveBOS version 2.0 and earlier, allowing remote attackers to read arbitrary files by manipulating the filename argument in the /feed/UploadImage.do endpoint.
Fujian Apex LiveBOS, a live broadcasting system, is vulnerable to a path traversal attack. This vulnerability, identified as CVE-2026-7519, exists due to insufficient input validation on the filename parameter within the /feed/UploadImage.do endpoint. Versions up to and including 2.0 are affected. Publicly available exploits exist, increasing the risk of exploitation. An attacker can leverage this flaw to access sensitive files on the server, potentially leading to information disclosure or further system compromise. Upgrading to version 2.1 or applying available patches is strongly recommended.
Attack Chain
- An attacker identifies a Fujian Apex LiveBOS instance running version 2.0 or earlier.
- The attacker crafts a malicious HTTP request targeting the /feed/UploadImage.do endpoint.
- The attacker manipulates the filename parameter within the request, injecting path traversal sequences (e.g., ../../).
- The server-side application fails to properly sanitize the filename, allowing the path traversal sequence to be processed.
- The application attempts to read a file based on the attacker-controlled path.
- If successful, the contents of the targeted file are returned to the attacker in the HTTP response.
- The attacker analyzes the leaked file content for sensitive information (e.g., credentials, configuration files).
Impact
Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files on the LiveBOS server. This could include configuration files containing database credentials, private keys, or other confidential information. The impact ranges from information disclosure to potential full system compromise, depending on the accessed data. There are no reported victims or sectors targeted as of yet, but the public availability of the exploit increases the likelihood of exploitation.
Recommendation
- Upgrade Fujian Apex LiveBOS to version 2.1 to remediate CVE-2026-7519.
- Deploy the Sigma rule
Detect LiveBOS Path Traversal Attemptto identify malicious requests exploiting the vulnerability. - Monitor web server logs for requests containing path traversal sequences targeting the
/feed/UploadImage.doendpoint.
Detection coverage 2
Detect LiveBOS Path Traversal Attempt
highDetects path traversal attempts in Fujian Apex LiveBOS via the filename parameter in UploadImage.do
Detect LiveBOS File Access via Path Traversal
criticalDetects access to sensitive files (e.g., /etc/passwd) via path traversal in Fujian Apex LiveBOS
Detection queries are kept inside the platform. Get full rules →