Логотип exploitDog
bind:CVE-2025-32950
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-32950

Количество 2

Количество 2

nvd логотип

CVE-2025-32950

10 месяцев назад

Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, attackers could manipulate the FileRef parameter to access files on the system where the Jmix application is deployed, provided the application server has the necessary permissions. This can be accomplished either by modifying the FileRef directly in the database or by supplying a harmful value in the fileRef parameter of the `/files` endpoint of the generic REST API. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-jx4g-3xqm-62vh

10 месяцев назад

io.jmix.localfs:jmix-localfs has a Path Traversal in Local File Storage

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-32950

Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, attackers could manipulate the FileRef parameter to access files on the system where the Jmix application is deployed, provided the application server has the necessary permissions. This can be accomplished either by modifying the FileRef directly in the database or by supplying a harmful value in the fileRef parameter of the `/files` endpoint of the generic REST API. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.

CVSS3: 6.5
0%
Низкий
10 месяцев назад
github логотип
GHSA-jx4g-3xqm-62vh

io.jmix.localfs:jmix-localfs has a Path Traversal in Local File Storage

CVSS3: 6.5
0%
Низкий
10 месяцев назад

Уязвимостей на страницу