Update CVE-2023-4450.yaml

patch-5
Dhiyaneshwaran 2024-07-15 12:05:16 +05:30 committed by GitHub
parent fbe7d54dd6
commit e3ce693b08
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 6 additions and 4 deletions

View File

@ -1,13 +1,15 @@
id: CVE-2023-4450 id: CVE-2023-4450
info: info:
name: JeecgBoot JimuReport Template injection name: JeecgBoot JimuReport - Template injection
author: Sumanth Vankineni author: Sumanth Vankineni
severity: critical severity: critical
description: | description: |
A vulnerability was found in jeecgboot JimuReport up to 1.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Template Handler. The manipulation leads to injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. A vulnerability was found in jeecgboot JimuReport up to 1.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Template Handler. The manipulation leads to injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
impact: Unauthorized api called /jmreport/queryFieldBySql led to remote arbitrary code execution due to parsing SQL statements using Freemarker. impact: |
remediation: Upgrading to version 1.6.1 is able to address this issue. It is recommended to upgrade the affected component. Unauthorized api called /jmreport/queryFieldBySql led to remote arbitrary code execution due to parsing SQL statements using Freemarker.
remediation: |
Upgrading to version 1.6.1 is able to address this issue. It is recommended to upgrade the affected component.
reference: reference:
- https://github.com/advisories/GHSA-j8h5-8rrr-m6j9 - https://github.com/advisories/GHSA-j8h5-8rrr-m6j9
- https://whoopsunix.com/docs/java/named%20module/ - https://whoopsunix.com/docs/java/named%20module/