提出 #653341: jeecgboot JeecgBoot 3.8.2 broken function level authorization情報

タイトルjeecgboot JeecgBoot 3.8.2 broken function level authorization
説明Proof of Concept (POC): A user with low privileges authenticates to the JeecgBoot application. The attacker sends a GET request to the /sys/tenant/exportXls endpoint. The endpoint can be called without any parameters to export all tenants. The application generates and returns an Excel file containing a list of all tenants in the system, including their names, IDs, and other details. The method lacks any authorization annotations, allowing any authenticated user to trigger the export.
ソース⚠️ https://www.cnblogs.com/aibot/p/19063356
ユーザー
 lucasg2g (UID 84737)
送信2025年09月12日 10:45 (8 月 ago)
モデレーション2025年09月25日 16:21 (13 days later)
ステータス承諾済み
VulDBエントリ325852 [JeecgBoot 迄 3.8.2 /sys/tenant/exportXls 特権昇格]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!