Description
In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions.
References (3)
Core 3
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/jfinal/jfinal/issues/171
Permissions Required, Vendor Advisory x_refsource_misc
https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946a
Permissions Required, Vendor Advisory x_refsource_misc
https://gitee.com/jfinal/cos/commit/8d26eec61f0d072a68bf7393cf3a8544a1112130
Scores
CVSS v3
7.5
EPSS
0.0029
EPSS Percentile
52.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-434
Status
published
Products (2)
com.jfinal/jfinal
0 - 4.5Maven
jfinal/jfinal
< 4.4
Published
Oct 08, 2019
Tracked Since
Feb 18, 2026