提出 #755222: ujcms 10.0.2 JDBC Connection Injection情報

タイトルujcms 10.0.2 JDBC Connection Injection
説明In the importChanel endpoint of ImportDataController, the application accepts a DataSourceSqlParams object from the user. The code directly passes the user-controlled driverClassName and url parameters to DriverManagerDataSource to establish a database connection. Due to the lack of validation on the JDBC URL and driver class name, an attacker can exploit this via: 1. Arbitrary File Read: By specifying the MySQL driver and connecting to an attacker-controlled "Rogue MySQL Server". Utilizing the LOAD DATA LOCAL INFILE feature of the MySQL protocol, the malicious server can request the client (victim server) to read and upload arbitrary local files (e.g., /etc/passwd or C:/Windows/win.ini). 2. Remote Code Execution (RCE): If drivers like H2 Database, SQLite, or a vulnerable MySQL driver (susceptible to deserialization attacks) are present in the classpath, the attacker can execute arbitrary system commands by crafting specific JDBC URLs (e.g., using H2's RUNSCRIPT command).
ソース⚠️ https://www.yuque.com/la12138/pa2fpb/gsz2l14wlz8c4nsn?singleDoc
ユーザー
 Saul1213 (UID 94577)
送信2026年02月10日 09:29 (2 月 ago)
モデレーション2026年02月21日 22:11 (12 days later)
ステータス承諾済み
VulDBエントリ347320 [Dromara UJCMS 10.0.2 ImportDataController import-channel importChanel driverClassName/url 特権昇格]
ポイント20

Do you know our Splunk app?

Download it now for free!