提交 #710152: Ruoyi Management System V4.8.1 Code Injection信息

标题Ruoyi Management System V4.8.1 Code Injection
描述The vulnerability exists in the CacheController at the '/monitor/cache/getnames' endpoint, where the fragment parameter does not adequately sanitize user input. This allows attackers to inject malicious code via carefully crafted Thymeleaf expressions. Although newer versions have implemented blacklist filtering, attackers can still bypass restrictions using specific formats (such as __|$${...}|__::.x) to achieve code execution.
来源⚠️ https://github.com/ltranquility/CVE/issues/26
用户
 Customer (UID 83474)
提交2025-12-09 10時01分 (5 月前)
管理2025-12-17 21時59分 (8 days later)
状态已接受
VulDB条目337047 [y_project RuoYi 直到 4.8.1 /monitor/cache/getnames fragment 权限提升]
积分20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!