Description
In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions.
Remediation
References
https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946a
https://gitee.com/jfinal/cos/commit/8d26eec61f0d072a68bf7393cf3a8544a1112130
https://github.com/jfinal/jfinal/issues/171
Related Vulnerabilities
CVE-2019-10400 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2016-4000 Vulnerability in maven package org.python:jython-standalone
CVE-2022-38750 Vulnerability in maven package org.yaml:snakeyaml
CVE-2022-36901 Vulnerability in maven package org.jenkins-ci.plugins:http_request
CVE-2020-17519 Vulnerability in maven package org.apache.flink:flink-runtime_2.12