Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
y_project RuoYi Backend User Import SysUserServiceImpl.java SysUserServiceImpl cross site scripting
Vulnerability Description
A vulnerability was found in y_project RuoYi up to 4.7.9. It has been declared as problematic. Affected by this vulnerability is the function SysUserServiceImpl of the file ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java of the component Backend User Import. The manipulation of the argument loginName leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The patch is named 9b68013b2af87b9c809c4637299abd929bc73510. It is recommended to apply a patch to fix this issue.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
RuoYi 跨站脚本漏洞
Vulnerability Description
RuoYi是中国若依(RuoYi)个人开发者的一款后台管理系统。 RuoYi 4.7.9及之前版本存在跨站脚本漏洞,该漏洞源于后台用户导入功能中的loginName参数处理不当,导致跨站脚本攻击。
CVSS Information
N/A
Vulnerability Type
N/A