GobyVuls/JeeSpringCloud_uploadFile.jsp_file_upload_vulnerability.md

13 lines
1.1 KiB
Markdown

## JeeSpringCloud uploadFile.jsp file upload vulnerability
| **Vulnerability** | JeeSpringCloud uploadFile.jsp file upload vulnerability |
| :----: | :-----|
| **Chinese name** | JeeSpringCloud uploadFile.jsp 文件上传漏洞 |
| **CVSS core** | 9.8 |
| **FOFA Query** (click to view the results directly)| [app="JeeSpringCloud"](https://en.fofa.info/result?qbase64=Ym9keT0iL2plZVNwcmluZ1N0YXRpYy9wbHVncy9qcXVlcnkvanF1ZXJ5IiB8fCBoZWFkZXI9ImNvbS5qZWVzcHJpbmcuc2Vzc2lvbi5pZCIgfHwgaGVhZGVyPSJjb20uamVlc3ByaW5nLnNlc3Npb24uaWQi)|
| **Number of assets affected** | 282 |
| **Description** | JeeSpringCloud is a free and open source Java Internet cloud rapid development platform.JeeSpringCloud can upload any file by accessing /static/uploadify/uploadFile.jsp and specify the file upload path through the ?uploadPath parameter, causing the server to be controlled. |
| **Impact** | An attacker can use this vulnerability to write a backdoor on the server side, execute code, obtain server permissions, and then control the entire web server. |
![](https://s3.bmp.ovh/imgs/2023/10/12/800e0ccfe95d6cbb.gif)