Advisories for Maven/Io.jmix.localfs/Jmix-Localfs package

2025

io.jmix.localfs:jmix-localfs has a Path Traversal in Local File Storage

Attackers could manipulate the FileRef parameter to access files on the system where the Jmix application is deployed, provided the application server has the necessary permissions. This can be accomplished either by modifying the FileRef directly in the database or by supplying a harmful value in the fileRef parameter of the /files endpoint of the generic REST API. Arbitrary file reading on the operating system where the Jmix process is …

io.jmix.localfs:jmix-localfs affected by DoS in the Local File Storage

The local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. The severity of the vulnerability is mitigated by the fact that the application UI and the generic REST API are typically accessible only to authenticated users. Additionally, …