In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions.
References
Link | Resource |
---|---|
https://github.com/jfinal/jfinal/issues/171 | Exploit Third Party Advisory |
https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946a | Permissions Required Vendor Advisory |
https://gitee.com/jfinal/cos/commit/8d26eec61f0d072a68bf7393cf3a8544a1112130 | Permissions Required Vendor Advisory |
Configurations
Information
Published : 2019-10-08 06:15
Updated : 2019-10-15 10:20
NVD link : CVE-2019-17352
Mitre link : CVE-2019-17352
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
jfinal
- jfinal