Submit #754590: jeecgboot 3.9.0 Server-Side Request Forgeryinfo

Titlejeecgboot 3.9.0 Server-Side Request Forgery
DescriptionA Server-Side Request Forgery (SSRF) vulnerability exists in the JeecgBoot framework within the /sys/common/uploadImgByHttp endpoint. The vulnerability arises from insufficient validation of user-supplied URLs in the fileUrl parameter, allowing authenticated attackers to induce the server to make HTTP requests to arbitrary domains, including sensitive internal network resources.The affected endpoint is designed to fetch remote images based on a URL provided in the JSON payload. However, the implementation lacks restrictions on the target IP address. By crafting a malicious request pointing to the loopback address (e.g., http://127.0.0.1:8000) or other private Intranet IP addresses, an attacker can bypass network firewalls. The server processes the request, retrieves the response content from the internal service, and saves it as a static file, effectively returning the internal data to the attacker.
Source⚠️ https://www.yuque.com/la12138/vxbwk9/glws4ppukxqtpfhl?singleDoc
User
 Saul1213 (UID 94577)
Submission02/09/2026 11:05 (2 months ago)
Moderation02/21/2026 18:34 (12 days later)
StatusAccepted
VulDB entry347315 [JeecgBoot 3.9.0 uploadImgByHttp fileUrl server-side request forgery]
Points20

Interested in the pricing of exploits?

See the underground prices here!