إرسال #710152: Ruoyi Management System V4.8.1 Code Injectionالمعلومات

عنوانRuoyi Management System V4.8.1 Code Injection
الوصفThe vulnerability exists in the CacheController at the '/monitor/cache/getnames' endpoint, where the fragment parameter does not adequately sanitize user input. This allows attackers to inject malicious code via carefully crafted Thymeleaf expressions. Although newer versions have implemented blacklist filtering, attackers can still bypass restrictions using specific formats (such as __|$${...}|__::.x) to achieve code execution.
المصدر⚠️ https://github.com/ltranquility/CVE/issues/26
المستخدم
 Customer (UID 83474)
ارسال09/12/2025 10:01 AM (4 أشهر منذ)
الاعتدال17/12/2025 09:59 PM (8 days later)
الحالةتمت الموافقة
إدخال VulDB337047 [y_project RuoYi حتى 4.8.1 /monitor/cache/getnames fragment تجاوز الصلاحيات]
النقاط20

Do you know our Splunk app?

Download it now for free!