Description
In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions.
Remediation
References
https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946a
https://gitee.com/jfinal/cos/commit/8d26eec61f0d072a68bf7393cf3a8544a1112130
https://github.com/jfinal/jfinal/issues/171
Related Vulnerabilities
CVE-2018-1000603 Vulnerability in maven package org.jenkins-ci.plugins:openstack-cloud
CVE-2023-46659 Vulnerability in maven package org.jenkins-ci.plugins:trac
CVE-2015-1814 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2023-41329 Vulnerability in maven package com.github.tomakehurst:wiremock-jre8
CVE-2023-29213 Vulnerability in maven package org.xwiki.platform:xwiki-platform-logging-script