Description
A vulnerability was identified in jishenghua jshERP up to 3.6. Affected by this vulnerability is an unknown functionality of the file /jshERP-boot/plugin/uploadPluginConfigFile of the component PluginController. Such manipulation of the argument configFile leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
3.1
3.2
3.3
3.4
3.5
3.6
Timeline
| 2026-01-28: | Advisory disclosed |
| 2026-01-28: | VulDB entry created |
| 2026-01-29: | VulDB entry last update |
Credits
mukyuuhate (VulDB User)
References
github.com/jishenghua/jshERP/issues/146
github.com/jishenghua/jshERP/issues/146
vuldb.com/?id.343245 (VDB-343245 | jishenghua jshERP PluginController uploadPluginConfigFile path traversal)
vuldb.com/?ctiid.343245 (VDB-343245 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.739805 (Submit #739805 | https://github.com/jishenghua/jshERP jshERP v3.6 Path Traversal)
github.com/jishenghua/jshERP/issues/146
github.com/jishenghua/jshERP/issues/146
github.com/jishenghua/jshERP/