CVE-2023-34660
Description
jjeecg-boot V3.5.0 has an unauthorized arbitrary file upload in /jeecg-boot/jmreport/upload interface.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
JeecgBoot v3.5.0 has an unauthenticated arbitrary file upload vulnerability in /jeecg-boot/jmreport/upload, enabling XSS and remote code execution.
Vulnerability
Overview The vulnerability exists in the /jeecg-boot/jmreport/upload endpoint of JeecgBoot v3.5.0. The endpoint lacks authentication and fails to validate the uploaded file type, allowing arbitrary files to be uploaded. Source code analysis shows that only a basic ../ path traversal filter is applied, but no check on file extension or content is performed [3].
Exploitation
Method An unauthenticated attacker can send a POST request to /jeecg-boot/jmreport/upload with a crafted file (e.g., an HTML file containing JavaScript or a shell script). The file is stored on the server, and its path is returned. The attacker can then access the uploaded file to execute malicious scripts (stored XSS) or, if the server executes uploaded scripts, achieve remote code execution [2][3].
Impact
Successful exploitation can lead to stored cross-site scripting (XSS) when the uploaded HTML is viewed by other users. Additionally, uploading executable files (e.g., .sh scripts) may enable arbitrary code execution on the server, depending on server configuration and file execution permissions [3].
Mitigation
Status As of the issue report, versions 3.5.0 and 3.5.1 are confirmed vulnerable; other versions have not been verified. Users should upgrade to a patched version (if available) or implement access controls and file type validation on the upload endpoint. The official repository does not provide an explicit fix advisory, but the issue has been reported (CVE-2023-34660) [2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jeecgframework.boot:jeecg-boot-parentMaven | <= 3.5.0 | — |
Affected products
2- jjeecg-boot/jjeecg-bootdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-jf2f-hvxx-4rqxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-34660ghsaADVISORY
- github.com/jeecgboot/jeecg-boot/issues/4990ghsaWEB
News mentions
0No linked articles in our index yet.