A vulnerability was determined in jeecgboot JimuReport up to 2.1.1. Affected by this issue is some unknown functionality of the file /drag/onlDragDataSource/testConnection of the component Data Large Screen Template. The manipulation leads to deserialization. The attack may be launched remotely. The vendor response to the GitHub issue report is: "Modified, next version updated".
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://vuldb.com/?id.319958 | vdb entry |
https://vuldb.com/?ctiid.319958 | permissions required signature |
https://vuldb.com/?submit.628028 | third party advisory |
https://github.com/jeecgboot/jimureport/issues/4010 | issue tracking |
https://github.com/jeecgboot/jimureport/issues/4010#issuecomment-3182053855 | issue tracking |