Vulnerability Description
In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jfinal | Jfinal | < 4.4 |
Related Weaknesses (CWE)
References
- https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946aPermissions RequiredVendor Advisory
- https://gitee.com/jfinal/cos/commit/8d26eec61f0d072a68bf7393cf3a8544a1112130Permissions RequiredVendor Advisory
- https://github.com/jfinal/jfinal/issues/171ExploitThird Party Advisory
- https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946aPermissions RequiredVendor Advisory
- https://gitee.com/jfinal/cos/commit/8d26eec61f0d072a68bf7393cf3a8544a1112130Permissions RequiredVendor Advisory
- https://github.com/jfinal/jfinal/issues/171ExploitThird Party Advisory
FAQ
What is CVE-2019-17352?
CVE-2019-17352 is a vulnerability with a CVSS score of 7.5 (HIGH). In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and ...
How severe is CVE-2019-17352?
CVE-2019-17352 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-17352?
Check the references section above for vendor advisories and patch information. Affected products include: Jfinal Jfinal.