| Название | jishenghua jshERP v3.5 Path Traversal |
|---|
| Описание | In the jshERP project, the endpoint `/systemConfig/exportExcelByParam` contains the following issue:
The external input parameter `title` is used for path concatenation and file creation. Due to the lack of validation on the path's legitimacy, an attacker can craft a malicious path to generate files in arbitrary directories or overwrite existing files in targeted directories.
Project Link: https://github.com/jishenghua/jshERP
Affected Version: v3.5
Affected API: /systemConfig/exportExcelByParam
Code Location: /jshERP-3.5/jshERP-boot/src/main/java/com/jsh/erp/controller/SystemConfigController.java:282 |
|---|
| Источник | ⚠️ https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250630-01.md |
|---|
| Пользователь | ShenxiuSecurity (UID 84374) |
|---|
| Представление | 30.06.2025 10:06 (10 месяцы назад) |
|---|
| Модерация | 12.07.2025 23:17 (13 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 316264 [jshERP до 3.5 SystemConfigController.java exportExcelByParam Название обход каталога] |
|---|
| Баллы | 20 |
|---|