VYPR
High severityNVD Advisory· Published Sep 8, 2023· Updated Sep 26, 2024

CVE-2023-41578

CVE-2023-41578

Description

Jeecg boot up to v3.5.3 was discovered to contain an arbitrary file read vulnerability via the interface /testConnection.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

JeecgBoot up to v3.5.3 allows unauthenticated arbitrary file read via a crafted MySQL connection in the /testConnection endpoint.

Vulnerability

Description

CVE-2023-41578 is an arbitrary file read vulnerability in JeecgBoot versions up to v3.5.3. The flaw exists in the /testConnection endpoint, which is used to test database connections. The application constructs a JDBC connection string from user-supplied input without proper sanitization, allowing an attacker to leverage the MySQL Connector/J's ability to read local files via the LOAD DATA LOCAL INFILE or similar mechanisms.

Attack

Vector

An attacker can exploit this by sending a crafted POST request to /testConnection with a malicious dbUrl parameter that includes a MySQL connection string designed to read arbitrary files from the server (e.g., jdbc:mysql://attacker.com/test?allowLoadLocalInfile=true&autoDeserialize=true). The attack does not require authentication and can be performed remotely if the application is accessible. The GitHub issue [2] provides a detailed proof-of-concept.

Impact

Successful exploitation allows an attacker to read sensitive files from the server, such as configuration files, credentials, or application source code, potentially leading to further compromise of the system. The vulnerability is categorized as high severity due to the ease of exploitation and the potential for data disclosure.

Mitigation

As of the advisory, JeecgBoot has not released an official patch for this specific version. Users are advised to upgrade to a later version (e.g., v3.5.4 or higher) once available, or restrict access to the /testConnection endpoint to trusted networks. The vulnerability has been publicly disclosed, and exploitation may be possible if the application remains unpatched [1][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jeecgframework.boot:jeecg-boot-parentMaven
<= 3.5.3

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.