Description
A vulnerability was found in jishenghua jshERP up to 3.6. The impacted element is the function install of the file /jshERP-boot/plugin/installByPath of the component com.gitee.starblues.integration.operator.DefaultPluginOperator. The manipulation of the argument path results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
3.1
3.2
3.3
3.4
3.5
3.6
Timeline
| 2026-01-29: | Advisory disclosed |
| 2026-01-29: | VulDB entry created |
| 2026-01-30: | VulDB entry last update |
Credits
mukyuuhate (VulDB User)
References
vuldb.com/?id.343351 (VDB-343351 | jishenghua jshERP installByPath install path traversal)
vuldb.com/?ctiid.343351 (VDB-343351 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.740649 (Submit #740649 | https://github.com/jishenghua/jshERP jshERP v3.6 Path Traversal)
github.com/jishenghua/jshERP/issues/147
github.com/jishenghua/jshERP/