제출 #606784: jishenghua jshERP v3.5 Path Traversal정보

제목jishenghua jshERP v3.5 Path Traversal
설명In the jshERP project, the endpoint `/systemConfig/exportExcelByParam` contains the following issue: The external input parameter `title` is used for path concatenation and file creation. Due to the lack of validation on the path's legitimacy, an attacker can craft a malicious path to generate files in arbitrary directories or overwrite existing files in targeted directories. Project Link: https://github.com/jishenghua/jshERP Affected Version: v3.5 Affected API: /systemConfig/exportExcelByParam Code Location: /jshERP-3.5/jshERP-boot/src/main/java/com/jsh/erp/controller/SystemConfigController.java:282
원천⚠️ https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250630-01.md
사용자
 ShenxiuSecurity (UID 84374)
제출2025. 06. 30. AM 10:06 (10 개월 ago)
모더레이션2025. 07. 12. PM 11:17 (13 days later)
상태수락
VulDB 항목316264 [jshERP 까지 3.5 SystemConfigController.java exportExcelByParam 제목 디렉토리 순회]
포인트들20

Interested in the pricing of exploits?

See the underground prices here!