[MAVEN:GHSA-GH24-C683-79R2] Duplicate Advisory: Arbitrary code execution in jfinal CMS

Severity Critical
Affected Packages 1
CVEs 1

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-8qhm-ch8h-xgjr. This link is maintained to preserve external references.

Original Description

Command execution vulnerability in the ActionEnter Class ins jfinal CMS version 5.1.0 allows attackers to execute arbitrary code via a created json file to the ueditor route.

Package Affected Version
pkg:maven/com.jflyfox/jflyfox_jfinal <= 5.1.0
ID
MAVEN:GHSA-GH24-C683-79R2
Severity
critical
URL
https://github.com/advisories/GHSA-gh24-c683-79r2
Published
2023-04-28T21:30:19
(16 months ago)
Modified
2023-11-10T05:01:21
(10 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/com.jflyfox/jflyfox_jfinal com.jflyfox jflyfox_jfinal <= 5.1.0
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...