提出 #710152: Ruoyi Management System V4.8.1 Code Injection情報

タイトルRuoyi Management System V4.8.1 Code Injection
説明The vulnerability exists in the CacheController at the '/monitor/cache/getnames' endpoint, where the fragment parameter does not adequately sanitize user input. This allows attackers to inject malicious code via carefully crafted Thymeleaf expressions. Although newer versions have implemented blacklist filtering, attackers can still bypass restrictions using specific formats (such as __|$${...}|__::.x) to achieve code execution.
ソース⚠️ https://github.com/ltranquility/CVE/issues/26
ユーザー
 Customer (UID 83474)
送信2025年12月09日 10:01 (4 月 ago)
モデレーション2025年12月17日 21:59 (8 days later)
ステータス承諾済み
VulDBエントリ337047 [y_project RuoYi 迄 4.8.1 /monitor/cache/getnames fragment 特権昇格]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!