CVE-2019-17352

In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jfinal:jfinal:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:32

Type Values Removed Values Added
References () https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946a - Permissions Required, Vendor Advisory () https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946a - Permissions Required, Vendor Advisory
References () https://gitee.com/jfinal/cos/commit/8d26eec61f0d072a68bf7393cf3a8544a1112130 - Permissions Required, Vendor Advisory () https://gitee.com/jfinal/cos/commit/8d26eec61f0d072a68bf7393cf3a8544a1112130 - Permissions Required, Vendor Advisory
References () https://github.com/jfinal/jfinal/issues/171 - Exploit, Third Party Advisory () https://github.com/jfinal/jfinal/issues/171 - Exploit, Third Party Advisory

Information

Published : 2019-10-08 13:15

Updated : 2024-11-21 04:32


NVD link : CVE-2019-17352

Mitre link : CVE-2019-17352

CVE.ORG link : CVE-2019-17352


JSON object : View

Products Affected

jfinal

  • jfinal
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type