[MAVEN:GHSA-GH24-C683-79R2] Duplicate Advisory: Arbitrary code execution in jfinal CMS
Severity
Critical
Affected Packages
1
CVEs
1
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-8qhm-ch8h-xgjr. This link is maintained to preserve external references.
Original Description
Command execution vulnerability in the ActionEnter Class ins jfinal CMS version 5.1.0 allows attackers to execute arbitrary code via a created json file to the ueditor route.
Package | Affected Version |
---|---|
pkg:maven/com.jflyfox/jflyfox_jfinal | <= 5.1.0 |
- ID
- MAVEN:GHSA-GH24-C683-79R2
- Severity
- critical
- URL
- https://github.com/advisories/GHSA-gh24-c683-79r2
- Published
-
2023-04-28T21:30:19
(16 months ago) - Modified
-
2023-11-10T05:01:21
(10 months ago) - Rights
- Maven Security Team
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/com.jflyfox/jflyfox_jfinal | com.jflyfox | jflyfox_jfinal | <= 5.1.0 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |