{ "Name": "JEECG 4.0 IconController Arbitrary File Upload", "Description": "

JEECG is a J2EE rapid development platform based on code generator.

There is an arbitrary file upload vulnerability in the IconController file of the JEECG development system version 4.0. Attackers can upload malicious Trojan horses to control server permissions.

", "Product": "JEECG", "Homepage": "https://gitee.com/jeecg/jeecg", "DisclosureDate": "2021-12-01", "Author": "1291904552@qq.com", "FofaQuery": "body=\"JEECG\"", "GobyQuery": "body=\"JEECG\"", "Level": "2", "Impact": "

There is an arbitrary file upload vulnerability in the IconController file of the JEECG development system version 4.0. Attackers can upload malicious Trojan horses to control server permissions.

", "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://gitee.com/jeecg/jeecg

1. Set access policies and whitelist access through security devices such as firewalls.

2.If not necessary, prohibit public network access to the system.

", "Translation": { "CN": { "Name": "JEECG 管理系统 4.0版本 IconController 任意文件上传漏洞", "VulType": ["文件上传"], "Tags": ["文件上传"], "Description": "

JEECG是一款基于代码生成器的J2EE快速开发平台。

JEECG开发系统4.0版本IconController文件存在任意文件上传漏洞,攻击者可上传恶意木马控制服务器权限。

", "Impact": "

JEECG开发系统4.0版本IconController文件存在任意文件上传漏洞,攻击者可上传恶意木马控制服务器权限。

", "Product": "JEECG", "Recommendation": "

⼚商已发布了漏洞修复程序,请及时关注更新:https://gitee.com/jeecg/jeecg

1、通过防⽕墙等安全设备设置访问策略,设置⽩名单访问。

2、如⾮必要,禁⽌公⽹访问该系统。

" }, "EN": { "Name": "JEECG 4.0 IconController Arbitrary File Upload", "VulType": ["file-upload"], "Tags": ["file-upload"], "Description": "

JEECG is a J2EE rapid development platform based on code generator.

There is an arbitrary file upload vulnerability in the IconController file of the JEECG development system version 4.0. Attackers can upload malicious Trojan horses to control server permissions.

", "Impact": "

There is an arbitrary file upload vulnerability in the IconController file of the JEECG development system version 4.0. Attackers can upload malicious Trojan horses to control server permissions.

", "Product": "JEECG", "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://gitee.com/jeecg/jeecg

1. Set access policies and whitelist access through security devices such as firewalls.

2.If not necessary, prohibit public network access to the system.

" } }, "References": [ "https://forum.butian.net/share/987" ], "HasExp": true, "ExpParams": [ { "name": "AttackType", "type": "select", "value": "Behinder3.0" } ], "ExpTips": null, "ScanSteps": null, "Tags": [ "file-upload" ], "VulType": [ "file-upload" ], "CVEIDs": [ "" ], "CVSSScore": "9.0", "AttackSurfaces": { "Application": null, "Support": null, "Service": null, "System": null, "Hardware": null }, "CNNVD": [ "" ], "CNVD": [ "" ] }