| Titre | Jeesite v5.15.1 XXE |
|---|
| Description | Jeesite has an is an XML External Entity (XXE) vulnerability (CWE-611).
The endpoint accepts a user-controlled POST parameter logoutRequest, which is parsed as XML without explicit XXE-hardening features (such as disabling DOCTYPE and external entities).
As a result, an attacker can supply malicious XML to trigger server-side outbound requests (SSRF behavior), and in some runtime configurations may attempt further entity-based abuse. |
|---|
| La source | ⚠️ https://www.yuque.com/la12138/pa2fpb/ew8x2qss8dv0bsu0?singleDoc |
|---|
| Utilisateur | Saul1213 (UID 94577) |
|---|
| Soumission | 20/02/2026 08:49 (il y a 2 mois) |
|---|
| Modérer | 01/03/2026 07:55 (9 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 348299 [thinkgem JeeSite jusqu’à 5.15.1 Endpoint CasOutHandler.java XML External Entity] |
|---|
| Points | 19 |
|---|