First published: Wed Jan 03 2024(Updated: )
Deserialization of Untrusted Data in jeecgFormDemoController in JEECG 4.0 and earlier allows attackers to run arbitrary code via crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Guojusoft Jeecg | <=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49442 is considered a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2023-49442, update to JEECG version 4.1 or later, which resolves this deserialization issue.
The potential impacts of CVE-2023-49442 include unauthorized access, data manipulation, and system compromise.
CVE-2023-49442 affects all users of JEECG version 4.0 and earlier.
CVE-2023-49442 allows attackers to exploit deserialization flaws through crafted POST requests to execute arbitrary code.