Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
io.jmix.rest:jmix-rest allows XSS in the /files Endpoint of the Generic REST API
Vulnerability Description
Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Jmix 跨站脚本漏洞
Vulnerability Description
Jmix是Jmix公司的一组库和工具,用于加速 Spring Boot 以数据为中心的应用程序开发。 Jmix 1.0.0至1.6.1版本和2.0.0至2.3.4版本存在跨站脚本漏洞,该漏洞源于文件路径操作不当,可能导致恶意JavaScript执行。
CVSS Information
N/A
Vulnerability Type
N/A