In J2eeFAST <=2.7, the backend function has unsafe filtering, which allows an attacker to trigger certain sensitive functions resulting in arbitrary code execution.
References
Link | Resource |
---|---|
https://gitee.com/dromara/J2EEFAST | Product |
https://github.com/dromara/J2EEFAST | Product |
https://github.com/lazy-forever/CVE-Reference/tree/main/2024/45944 | Exploit Third Party Advisory |
Configurations
History
16 Apr 2025, 15:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitee.com/dromara/J2EEFAST - Product | |
References | () https://github.com/dromara/J2EEFAST - Product | |
References | () https://github.com/lazy-forever/CVE-Reference/tree/main/2024/45944 - Exploit, Third Party Advisory | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:j2eefast:j2eefast:*:*:*:*:*:*:*:* | |
First Time |
J2eefast
J2eefast j2eefast |
21 Oct 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
21 Oct 2024, 17:10
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Oct 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-18 19:15
Updated : 2025-04-16 15:04
NVD link : CVE-2024-45944
Mitre link : CVE-2024-45944
CVE.ORG link : CVE-2024-45944
JSON object : View
Products Affected
j2eefast
- j2eefast
CWE