Submeter #754590: jeecgboot 3.9.0 Server-Side Request Forgeryinformação

Títulojeecgboot 3.9.0 Server-Side Request Forgery
DescriçãoA Server-Side Request Forgery (SSRF) vulnerability exists in the JeecgBoot framework within the /sys/common/uploadImgByHttp endpoint. The vulnerability arises from insufficient validation of user-supplied URLs in the fileUrl parameter, allowing authenticated attackers to induce the server to make HTTP requests to arbitrary domains, including sensitive internal network resources.The affected endpoint is designed to fetch remote images based on a URL provided in the JSON payload. However, the implementation lacks restrictions on the target IP address. By crafting a malicious request pointing to the loopback address (e.g., http://127.0.0.1:8000) or other private Intranet IP addresses, an attacker can bypass network firewalls. The server processes the request, retrieves the response content from the internal service, and saves it as a static file, effectively returning the internal data to the attacker.
Fonte⚠️ https://www.yuque.com/la12138/vxbwk9/glws4ppukxqtpfhl?singleDoc
Utilizador
 Saul1213 (UID 94577)
Submissão09/02/2026 11h05 (há 3 meses)
Moderação21/02/2026 18h34 (12 days later)
EstadoAceite
Entrada VulDB347315 [JeecgBoot 3.9.0 uploadImgByHttp fileUrl Elevação de Privilégios]
Pontos20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!