From what I see, the exploit demo takes an uploaded file and puts that in the directory which is part of the classpath. That actually gets scanned by logback, but the uploaded file could actually be any Java-class file. Allowing an upload of files into directories which are part of the classpath is the issue. Am I getting something wrong here? Or do I oversee something and logback enables loading code from any location an easy exploitable default? |