提交 #204405: spider-flow fastjson jdbc deserialization 信息

标题 spider-flow fastjson jdbc deserialization
描述 Found jdbc using controls in spider-flow-web. A deserialization attack can be performed. Dependency mysql-connector-java in\spider-flow-api\pom.xml The DriverManager.getConnection() function (used by regular jdbc drivers) is executed in line 61 of the code src/main/java/org/spiderflow/controller/DataSourceController.java. Filtering and other operations do not exist in the calling process and can be accessed directly through the API.
来源⚠️ https://github.com/bayuncao/vul-cve
用户
 bayuncao (UID 50143)
提交2023-09-06 07時25分 (3 年前)
管理2023-09-16 08時43分 (10 days later)
状态已接受
VulDB条目239857 [spider-flow 直到 0.5.0 API DataSourceController.java DriverManager.getConnection 权限提升]
积分20

Want to know what is going to be exploited?

We predict KEV entries!