| 제목 | jishenghua jshERP v3.5 Path Traversal |
|---|
| 설명 | In the jshERP project, the endpoint `/systemConfig/exportExcelByParam` contains the following issue:
The external input parameter `title` is used for path concatenation and file creation. Due to the lack of validation on the path's legitimacy, an attacker can craft a malicious path to generate files in arbitrary directories or overwrite existing files in targeted directories.
Project Link: https://github.com/jishenghua/jshERP
Affected Version: v3.5
Affected API: /systemConfig/exportExcelByParam
Code Location: /jshERP-3.5/jshERP-boot/src/main/java/com/jsh/erp/controller/SystemConfigController.java:282 |
|---|
| 원천 | ⚠️ https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250630-01.md |
|---|
| 사용자 | ShenxiuSecurity (UID 84374) |
|---|
| 제출 | 2025. 06. 30. AM 10:06 (10 개월 ago) |
|---|
| 모더레이션 | 2025. 07. 12. PM 11:17 (13 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 316264 [jshERP 까지 3.5 SystemConfigController.java exportExcelByParam 제목 디렉토리 순회] |
|---|
| 포인트들 | 20 |
|---|