CVE-2026-3187
中文标题:
(暂无数据)
英文标题:
feiyuchuixue sz-boot-parent API Endpoint upload unrestricted upload
漏洞描述
中文描述:
(暂无数据)
英文描述:
A vulnerability was identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this issue is some unknown functionality of the file /api/admin/sys-file/upload of the component API Endpoint. Such manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 1.3.3-beta can resolve this issue. The name of the patch is aefaabfd7527188bfba3c8c9eee17c316d094802. Upgrading the affected component is recommended. The project was informed beforehand and acted very professional: "We have introduced a whitelist restriction on the /api/admin/sys-file/upload endpoint via the oss.allowedExts and oss.allowedMimeTypes configuration options, allowing the specification of permitted file extensions and MIME types for uploads."
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| feiyuchuixue | sz-boot-parent | 1.3.2-beta | - | - |
cpe:2.3:a:feiyuchuixue:sz-boot-parent:1.3.2-beta:*:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | * | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:*:*:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.0.0 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.0.0:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.0.1 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.0.1:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.0.2 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.0.2:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.1.0 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.1.0:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.2.0 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.2.0:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.2.1 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.2.1:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.2.2 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.2.2:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.2.3 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.2.3:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.2.4 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.2.4:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.2.5 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.2.5:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.2.6 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.2.6:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.3.0 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.3.0:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.3.1 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.3.1:beta:*:*:*:*:*:*
|
| szadmin | sz-boot-parent | 1.3.2 | - | - |
cpe:2.3:a:szadmin:sz-boot-parent:1.3.2:beta:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
4.0 (cna)
MEDIUMCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3.0 (cna)
MEDIUMCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2.0 (cna)
MEDIUMAV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2026-3187 |
2026-02-26 03:19:54 | 2026-02-25 22:00:02 |
| NVD | nvd_CVE-2026-3187 |
2026-02-26 02:00:04 | 2026-02-25 22:00:05 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 16
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']