Submit #649755: jeecgboot jimureport ≤ v2.1.2 Deserializationinfo

Titlejeecgboot jimureport ≤ v2.1.2 Deserialization
DescriptionIn jimureport ≤ v2.1.2, the MySQL JDBC deserialization vulnerability arises because user-controlled JDBC connection parameters are not properly filtered. An attacker can craft a malicious URL to exploit this flaw, resulting in arbitrary file read.
Source⚠️ https://github.com/jeecgboot/jimureport/issues/4116
User
 ez-lbz (UID 87033)
Submission09/07/2025 05:04 (5 months ago)
Moderation09/21/2025 10:19 (14 days later)
StatusAccepted
VulDB entry325126 [jeecgboot JimuReport up to 2.1.2 MySQL JDBC testConnection deserialization]
Points16

Do you need the next level of professionalism?

Upgrade your account now!