漏洞描述 JeecgBoot是一款基于BPM的低代码平台。jeecg-boot <= 2.4.5版本中API 接口/sys/user/querySysUser存在泄露敏感信息,如电子邮件、电话、枚举系统中的用户名。攻击者通过构造特殊URL地址,读取系统敏感信息。
相关漏洞推荐 Jeecgboot /jmreport/save远程代码执行漏洞 Jeecg-boot v2.1.2-v3.0.0 后台未授权SQL注入漏洞: Jeecg-boot v2.1.2-v3.0.0 后台未授权SQL注入漏洞 jeecgboot-commoncontroller-parserxml-fileupload: Jeecgboot commonController parserXml fileupload Jeecg-Boot /sys/dict/queryTableData SQL 注入漏洞(CVE-2022-45205) Jeecg-Boot /sys/dict/loadTreeData SQL 注入漏洞(CVE-2023-38992) POC CVE-2021-37304: Jeecg Boot <= 2.4.5 - Information Disclosure POC CVE-2021-37305: Jeecg Boot <= 2.4.5 - Sensitive Information Disclosure POC CVE-2023-1454: Jeecg-boot 3.5.0 qurestSql - SQL Injection POC CVE-2023-33510: Jeecg P3 Biz Chat - Local File Inclusion POC CVE-2023-34659: JeecgBoot 3.5.0 - SQL Injection POC CVE-2023-38992: Jeecg-Boot v3.5.1 - SQL Injection POC CVE-2023-4450: JeecgBoot JimuReport - Template injection POC CVE-2024-48307: JeecgBoot v3.7.1 - SQL Injection