VYPR
Moderate severityNVD Advisory· Published Jun 16, 2023· Updated Dec 17, 2024

CVE-2023-34660

CVE-2023-34660

Description

jjeecg-boot V3.5.0 has an unauthorized arbitrary file upload in /jeecg-boot/jmreport/upload interface.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

JeecgBoot v3.5.0 has an unauthenticated arbitrary file upload vulnerability in /jeecg-boot/jmreport/upload, enabling XSS and remote code execution.

Vulnerability

Overview The vulnerability exists in the /jeecg-boot/jmreport/upload endpoint of JeecgBoot v3.5.0. The endpoint lacks authentication and fails to validate the uploaded file type, allowing arbitrary files to be uploaded. Source code analysis shows that only a basic ../ path traversal filter is applied, but no check on file extension or content is performed [3].

Exploitation

Method An unauthenticated attacker can send a POST request to /jeecg-boot/jmreport/upload with a crafted file (e.g., an HTML file containing JavaScript or a shell script). The file is stored on the server, and its path is returned. The attacker can then access the uploaded file to execute malicious scripts (stored XSS) or, if the server executes uploaded scripts, achieve remote code execution [2][3].

Impact

Successful exploitation can lead to stored cross-site scripting (XSS) when the uploaded HTML is viewed by other users. Additionally, uploading executable files (e.g., .sh scripts) may enable arbitrary code execution on the server, depending on server configuration and file execution permissions [3].

Mitigation

Status As of the issue report, versions 3.5.0 and 3.5.1 are confirmed vulnerable; other versions have not been verified. Users should upgrade to a patched version (if available) or implement access controls and file type validation on the upload endpoint. The official repository does not provide an explicit fix advisory, but the issue has been reported (CVE-2023-34660) [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jeecgframework.boot:jeecg-boot-parentMaven
<= 3.5.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.