An issue was discovered in getrebuild/rebuild 4.0.4. The affected source code class is com.rebuild.web.RebuildWebInterceptor, and the affected function is preHandle In the filter code, use CodecUtils.urlDecode(request.getRequestURI()) to obtain the URL-decoded request path, and then determine whether the path endsWith /error. If so, execute return true to skip this Interceptor. Else, redirect to /user/login api. Allowing unauthenticated attackers to gain sensitive information or escalated privileges.
References
| Link | Resource |
|---|---|
| https://racerz.notion.site/Rebuild-Vulnerability-1ede0e0074f280d8a906c38442a393f0 | Exploit Third Party Advisory |
| https://www.notion.so/racerz/Rebuild-Vulnerability-1ede0e0074f280d8a906c38442a393f0?pvs=4 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-08-25 15:15
Updated : 2025-10-09 17:54
NVD link : CVE-2025-50900
Mitre link : CVE-2025-50900
CVE.ORG link : CVE-2025-50900
JSON object : View
Products Affected
getrebuild
- rebuild
CWE
CWE-284
Improper Access Control
