Description
In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions.
Remediation
References
https://github.com/jfinal/jfinal/issues/171
https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946a
https://gitee.com/jfinal/cos/commit/8d26eec61f0d072a68bf7393cf3a8544a1112130
Related Vulnerabilities
CVE-2018-5673 Vulnerability in maven package org.webjars.bowergithub.dojo:dojo
CVE-2020-28472 Vulnerability in maven package org.webjars.npm:aws-sdk
CVE-2021-26814 Vulnerability in npm package wazuh
CVE-2022-36944 Vulnerability in maven package org.scala-lang:scala-library
CVE-2021-23631 Vulnerability in npm package convert-svg-core