إرسال #204405: spider-flow fastjson jdbc deserialization المعلومات

عنوان spider-flow fastjson jdbc deserialization
الوصف Found jdbc using controls in spider-flow-web. A deserialization attack can be performed. Dependency mysql-connector-java in\spider-flow-api\pom.xml The DriverManager.getConnection() function (used by regular jdbc drivers) is executed in line 61 of the code src/main/java/org/spiderflow/controller/DataSourceController.java. Filtering and other operations do not exist in the calling process and can be accessed directly through the API.
المصدر⚠️ https://github.com/bayuncao/vul-cve
المستخدم
 bayuncao (UID 50143)
ارسال06/09/2023 07:25 AM (3 سنوات منذ)
الاعتدال16/09/2023 08:43 AM (10 days later)
الحالةتمت الموافقة
إدخال VulDB239857 [spider-flow حتى 0.5.0 API DataSourceController.java DriverManager.getConnection تجاوز الصلاحيات]
النقاط20

Do you know our Splunk app?

Download it now for free!