Отправить #606784: jishenghua jshERP v3.5 Path TraversalИнформация

Названиеjishenghua jshERP v3.5 Path Traversal
ОписаниеIn the jshERP project, the endpoint `/systemConfig/exportExcelByParam` contains the following issue: The external input parameter `title` is used for path concatenation and file creation. Due to the lack of validation on the path's legitimacy, an attacker can craft a malicious path to generate files in arbitrary directories or overwrite existing files in targeted directories. Project Link: https://github.com/jishenghua/jshERP Affected Version: v3.5 Affected API: /systemConfig/exportExcelByParam Code Location: /jshERP-3.5/jshERP-boot/src/main/java/com/jsh/erp/controller/SystemConfigController.java:282
Источник⚠️ https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250630-01.md
Пользователь
 ShenxiuSecurity (UID 84374)
Представление30.06.2025 10:06 (10 месяцы назад)
Модерация12.07.2025 23:17 (13 days later)
Статуспринято
Запись VulDB316264 [jshERP до 3.5 SystemConfigController.java exportExcelByParam Название обход каталога]
Баллы20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!