From e3ce693b080a1a2ef15ce252b916ba8acecb4b32 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Jul 2024 12:05:16 +0530 Subject: [PATCH] Update CVE-2023-4450.yaml --- http/cves/2023/CVE-2023-4450.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/http/cves/2023/CVE-2023-4450.yaml b/http/cves/2023/CVE-2023-4450.yaml index aee11f7071..9b0602f648 100644 --- a/http/cves/2023/CVE-2023-4450.yaml +++ b/http/cves/2023/CVE-2023-4450.yaml @@ -1,13 +1,15 @@ id: CVE-2023-4450 info: - name: JeecgBoot JimuReport Template injection + name: JeecgBoot JimuReport - Template injection author: Sumanth Vankineni severity: critical description: | - A vulnerability was found in jeecgboot JimuReport up to 1.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Template Handler. The manipulation leads to injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. - impact: Unauthorized api called /jmreport/queryFieldBySql led to remote arbitrary code execution due to parsing SQL statements using Freemarker. - remediation: Upgrading to version 1.6.1 is able to address this issue. It is recommended to upgrade the affected component. + A vulnerability was found in jeecgboot JimuReport up to 1.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Template Handler. The manipulation leads to injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. + impact: | + Unauthorized api called /jmreport/queryFieldBySql led to remote arbitrary code execution due to parsing SQL statements using Freemarker. + remediation: | + Upgrading to version 1.6.1 is able to address this issue. It is recommended to upgrade the affected component. reference: - https://github.com/advisories/GHSA-j8h5-8rrr-m6j9 - https://whoopsunix.com/docs/java/named%20module/