Description
An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.
Remediation
References
https://gitee.com/y_project/RuoYi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6
https://gitee.com/y_project/RuoYi/issues/I57IME
https://github.com/yangzongzhuan/RuoYi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6
https://github.com/yangzongzhuan/RuoYi/issues/118
Related Vulnerabilities
CVE-2019-10389 Vulnerability in maven package org.jenkins-ci.plugins:relution-publisher
CVE-2020-2226 Vulnerability in maven package org.jenkins-ci.plugins:matrix-project
CVE-2019-10062 Vulnerability in npm package aurelia-framework
CVE-2019-15138 Vulnerability in maven package org.webjars.npm:html-pdf
CVE-2018-1000096 Vulnerability in npm package tiny-json-http